A Secured and Efficient Biometric Cryptographic Authentication in Pervasive Computing
K.Swetha1, P.S.A. Pavan Kumar Reddy2, S. Maneesha Durga3, A.V. Gautham4

1K.Swetha, Department of Computer Science, Koneru Lakshmaiah Education Foundation, Guntur (A.P), India.
2P.S.A.Pavan Kumar Reddy, Department of Computer Science, Koneru Lakshmaiah Education Foundation, Guntur (A.P), India. Email:
3S.Maneesha Durga, Department of Computer Science, Koneru Lakshmaiah Education Foundation, Guntur, India,
4A.V.Gautham, Department of Computer Science, Koneru Lakshmaiah Education Foundation, Guntur (A.P), India. 

Manuscript received on 18 February 2018 | Revised Manuscript received on 27 February 2018 | Manuscript published on 28 February 2018 | PP: 50-53 | Volume-7 Issue-3, February 2018 | Retrieval Number: C5296027318/18©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: In pervasive computing environments, clients can get benefits anytime and anywhere, but the inescapability and versatility of the circumstances bring present day security challenges. The client did know about the service provider and vice versa. They have to authenticate each other before starting the service. The cloud has to identify or authenticate the client or user by his/her identity i.e, fingerprint. Here the two important things that we can consider were about privacy and security. In this case, the client should not expose any private information to the cloud such as his physical location, ID and so on when being authenticated. In this paper, we provided a authentication scheme based on biometric encryption to enclose the data transferring between a client and cloud. In this proposal, client’s authentication was hidden.
Keywords: Privacy, Security, Biometric encryption, Pervasive Computing, RSA, RSA Cryptography, Biometry and Cryptography

Scope of the Article: Cryptography and Applied Mathematics