Offline Handwritten Signatures Based Multifactor Authentication in Cloud Computing using Deep CNN Model

K. Devi Priya*, L. Sumalatha**
* Department of Computer Science and Engineering, Aditya Engineering College, Surampalem, Andhra Pradesh, India.
** Department of Computer Science and Engineering, University College of Engineering Kakinada, Andhra Pradesh, India.
Periodicity:July - December'2019
DOI : https://doi.org/10.26634/jcc.6.2.16640

Abstract

Cloud Security is an important factor that influences the adoption of cloud applications into bank domains. Many researchers proposed secure authentication mechanisms based on the traditional factors, biometric factors, captcha and certificates etc. This paper proposes a biometric handwritten signature recognition using Deep Convolution Neural Networks (DCNN). The proposed model uses signature as a biometric factor to verify the authenticity of the users along with traditional credentials. The extraction of the features are performed using DeepCNN model in the registration and verification process. The practical setup is done through NIVIDIA DGX environment using Python keras and tensor flow as backend. An experimental result shows 99% of accuracy and validation accuracy.

Keywords

Cloud Security, Handwritten Signatures, Convolutional Neural Network, Features Extraction, Cloud User Authentication, NIVIDIA DGX Python Keras.

How to Cite this Article?

Priya, K. D., Sumalatha, L.(2019). Offline Handwritten Signatures Based Multifactor Authentication in Cloud Computing Using Deep CNN Model, i-manager's Journal on Cloud Computing, 6(2), 13-25. https://doi.org/10.26634/jcc.6.2.16640

References

[1]. Abozaid, A., Haggag, A., Kasban, H., & Eltokhy, M. (2019). Multimodal biometric scheme for human authentication technique based on voice and face recognition fusion. Multimedia Tools and Applications, 78(12), 16345-16361. https://doi.org/10.1007/s11042- 018-7012-3
[2]. Adjei, J. K. (2015). Explaining the Role of Trust in Cloud Computing Services. Info, 17(1), 54-67. https://doi. org/10.1108/info-09-2014-0042
[3]. Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R., Konwinski, A. D., Lee, G., Patterson, D., Rabkin, A., Stoica, I., & Zaharia, M. (2010). A View of Cloud Computing, Communications of the ACM. https://doi.org/10.1145/ 1721654.1721672
[4]. Banyal, R. K., Jain, P., & Jain, V. K. (2013, September). Multi-factor authentication framework for cloud computing. In 2013 5th International Conference on Computational Intelligence, Modelling and Simulation (pp. 105-110). IEEE. https://doi.org/10.1109/CIMSim. 2013.25
[5]. Bertolini, D., Oliveira, L. S., Justino, E., & Sabourin, R. (2010). Reducing forgeries in writer-independent off-line signature verification through ensemble of classifiers. Pattern Recognition, 43(1), 387-396. https://doi.org/ 10.1016/j.patcog.2009.05.009
[6]. Bommagani, A. S., Valenti, M. C., & Ross, A. (2014, October). A framework for secure cloud-empowered mobile biometrics. In 2014 IEEE Military Communications Conference (pp. 255-261). IEEE. https://doi.org/ 10.1109/MILCOM.2014.47
[7]. Carroll, M., Van Der Merwe, A., & Kotze, P. (2011, August). Secure cloud computing: Benefits, risks and controls. In 2011 Information Security for South Africa (pp. 1-9). IEEE. https://doi.org/10.1109/ISSA.2011.6027519
[8]. Catteddu, D. (2009, December). Cloud Computing: Benefits, risks and recommendations for information security. In Iberic Web Application Security Conference (pp. 17-17). Springer. https://doi.org/ 10.1007/978-3-642- 16120-9_9
[9]. Choudhary, N. Y., Patil, M. R., Bhadade, U., & Chaudhari, B. M. (2013). Signature recognition and verification system using back propagation neural network. International Jorunal of IT, Engineering and Applied Sciences Research (IJIEASR), 2(1), 1-8. Retrieved from https://pdfs.semanticscholar.org/b8b3/4e31 deac1bab5ea2291a186dedcbb9500179.pdf
[10]. Choudhury, A. J., Kumar, P., Sain, M., Lim, H., & Jae- Lee, H. (2011, December). A strong user authentication framework for cloud computing. In 2011 IEEE Asia-Pacific Services Computing Conference (pp. 110-115). IEEE. https://doi.org/10.1109/APSCC.2011.14
[11]. Cremers, C. (n.d). The scyther tool generic installation instructions, CISPA − Helmholtz Center for Information Security, Saarbrücken, Germany. Retrieved from https://people.cispa.io/cas.cremers/scyther/installgeneric. html
[12]. Dey, S., Sampalli, S., & Ye, Q. (2016). MDA: Message Digest-based Authentication for mobile cloud computing. Journal of Cloud Computing, 5(1), 18. Retrieved from https://link.springer.com/article/ 10.1186/s13677-016-0068-6
[13]. Eskander, G. S., Sabourin, R., & Granger, E. (2013). Hybrid writer-independent–writer-dependent offline signature verification system. IET Biometrics, 2(4), 169- 181. https://doi.org/10.1049/iet-bmt.2013.0024
[14]. Goud, N.(n.d). Cyber Attack on Cloud Computing Company makes France News Websites go Dark. Retrieved from https://www.cybersecurity-insiders.com/ cyber-attack-on-cloud-computing-company-makesfrance- news-websites-go-dark/
[15]. Hafemann, L. G., Sabourin, R., & Oliveira, L. S. (2017). Learning features for offline handwritten signature verification using deep convolutional neural networks. Pattern Recognition, 70, 163-176. https://doi.org/ 10.1016/j.patcog.2017.05.012
[16]. Hamidi, N. A., Rahimi, G. M., Nafarieh, A., Hamidi, A., & Robertson, B. (2013). Personalized security approaches in e-banking employing flask architecture over cloud environment. Procedia Computer Science, 21, 18-24. https://doi.org/10.1016/j.procs.2013.09.005
[17]. Hossain, M. S., & Muhammad, G. (2015). Cloudassisted speech and face recognition framework for health monitoring. Mobile Networks and Applications, 20(3), 391- 399. https://doi.org/10.1007/s11036-015-0586-3
[18]. Howard, A. G., Zhu, M., Chen, B., Kalenichenko, D., Wang, W., Weyand, T., Andreetto, M., & Adam, H. (2017). Mobilenets: Efficient Convolutional Neural Networks for Mobile Vision Applications. arXiv preprint arXiv:1704. 04861. Retrieved from https://arxiv.org/pdf/1704.04 861.pdf
[19]. Hu, J., & Chen, Y. (2013, August). Offline signature verification using real adaboost classifier combination of pseudo-dynamic features. In 2013 12th International Conference on Document Analysis and Recognition (pp. 1345-1349). IEEE. https://doi.org/10.1109/ICDAR. 2013.272
[20]. Huang, C. Y., Tzeng, W. C., Tzeng, G. H., & Yuan, M. C. (2011). Derivations of information technology strategies for enabling the cloud based banking service by a hybrid MADM framework. In Intelligent Decision Technologies (pp. 123-134). Springer. Retrieved from https://link.springer.com/chapter/ 10.1007/978-3-642- 22194-1_13
[21]. Jiang, Q., Khan, M. K., Lu, X., Ma, J., & He, D. (2016). A privacy preserving three-factor authentication protocol for e-Health clouds. The Journal of Supercomputing, 72(10), 3826-3849. https://doi.org/10.1007/s11227-015- 1610-xv
[22]. Kumar, C. R., & Bindu, A. (2006, November). An efficient skin illumination compensation model for efficient face detection. In IECON 2006-32nd Annual Conference on IEEE Industrial Electronics (pp. 3444- 3449). IEEE. https://doi.org/10.1109/IECON.2006.348133
[23]. Kuo, C. C. J. (2017). The CNN as a guided multilayer recos transform [lecture notes]. IEEE Signal Processing Magazine, 34(3), 81-89. https://doi.org/10.1109/ MSP.2017.2671158
[24]. Lee, J. K., Ryu, S. R., & Yoo, K. Y. (2002). Fingerprintbased remote user authentication scheme using smart cards. Electronics Letters, 38(12), 554-555. https://doi. org/10.1049/el:20020380
[25]. Lee, S., Ong, I., Lim, H. T., & Lee, H. J. (2010). Two factor authentication for cloud computing. Journal of Information and Communication Convergence Engineering, 8(4), 427-432. https://doi.org/10.6109/jicce. 2010.8.4.427
[26]. Liu, W., Uluagac, A. S., & Beyah, R. (2014, April). MACA: A privacy-preser ving multi-factor cloud authentication system utilizing big data. In 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) (pp. 518-523). IEEE. https://doi.org/ 10.1109/INFCOMW.2014.6849285
[27]. Mehra, R., & Gangwar, D. R. (2014). Enhanced offline signature recognition using neuro-fuzzy and SURF features techniques. International Journal of Computer Science and Information Technologies, 5(5). Retrieved from https://pdfs.semanticscholar.org/09d6/28a889c 944086ec52291348ddae2a6baa21d.pdf
[28]. Mell, P., & Grance, T. (2011). The NIST Definition of Cloud Computing. https://doi.org/10.6028/NIST.SP.800- 145
[29]. Montserrat, D. M., Lin, Q., Allebach, J., & Delp, E. J. (2017). Training object detection and recognition CNN models using data augmentation. Electronic Imaging, 2017(10), 27-36. https://doi.org/10.2352/ISSN.2470- 1173.2017.10.IMAWM-163
[30]. Nagaraju, S., & Parthiban, L. (2015). Trusted framework for online banking in public cloud using multifactor authentication and privacy protection gateway. Journal of Cloud Computing, 4(1), 22. https://doi.org/ 10.1186/s13677-015-0046-4
[31]. Pang, S., Kim, D., & Bang, S. Y. (2003). Membership authentication in the dynamic group by face classification using SVM ensemble. Pattern Recognition Letters, 24(1-3), 215-225. https://doi.org/10.1016/S0167- 8655(02)00213-1
[32]. Philip, J., & Bharadi, V. A. (2016). Signature Verification SAAS implementation on Microsoft Azure cloud. Procedia Computer Science, 79, 410-418. https://doi.org/10.1016/j.procs.2016.03.053
[33]. Prasanalakshmi, B., & Kannammal, A. (2012). Secure credential federation for hybrid cloud environment with SAML enabled multifactor authentication using biometrics. International Journal of Computer Applications, 53(18). Retrieved from https://pdfs.semanticscholar.org/cf2f/440296f9e213bf5 aa81800778819bfbb132e.pdf
[34]. Rani, S., & Gangal, A. (2012). Security issues of banking adopting the application of cloud computing. International Journal of Information Technology, 5(2), 243-246.
[35]. Rivard, D., Granger, E., & Sabourin, R. (2013). Multifeature extraction and selection in writer-independent offline signature verification. International Journal on Document Analysis and Recognition (IJDAR), 16(1), 83- 103. https://doi.org/10.1007/s10032-011-0180-6
[36]. Strom, N. (2015). Scalable distributed DNN training using commodity GPU cloud computing. In 16th Annual Conference of the International Speech Communication Association. Retrieved from https://www. isca-speech.org/archive/interspeech_2015/i15_14 88.html
[37]. Sun, Y., Chen, Y., Wang, X., & Tang, X. (2014a). Deep learning face representation by joint identificationverification. In Advances in Neural Information Processing Systems (pp. 1988-1996). Retrieved from http://www.ee. cuhk.edu.hk/~xgwang/papers/sunCWTnips14.pdf
[38]. Sun, Y., Wang, X., & Tang, X. (2014b). Deep learning face representation from predicting 10,000 classes. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (pp. 1891-1898). Retrieved from http://mmlab.ie.cuhk.edu.hk/pdf/YiSun_CVPR14.pd
[39]. Suresh, M. C. (2010). Cloud computing: Strategic considerations for banking and financial services institutions. TCS White Papers, 1-24.
[40]. Trevathan, J., & McCabe, A. (2005). Remote handwritten signature authentication. In Proceedings of nd the 2 International Conference on e-Business and Telecommunication Networks (ICETE), United Kingdom, Volume 1, 335-339. https://doi.org/10.5220/00014192 03350339
[41]. Yan, G. (2017, July). Applicatio of cloud computing in banking: Advantages and challenges. In 2017 2nd International Conference on Politics, Economics and Law (ICPEL 2017). Atlantis Press. https://doi.org/10.2991/icpel- 17.2017.8
[42]. Zissis, D., & Lekkas, D. (2012). Addressing cloud computing security issues. Future Generation Computer Systems, 28(3), 583-592. https://doi.org/10.1016/j.future. 2010.12.006

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

If you have access to this article please login to view the article or kindly login to purchase the article
Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.