Show simple item record

dc.contributor.authorSantos, N
dc.contributor.authorGhita, B
dc.contributor.authorMasala, G
dc.date.accessioned2023-11-01T17:42:15Z
dc.date.available2023-11-01T17:42:15Z
dc.date.issued2023-05-23
dc.identifier.issn2376-4562
dc.identifier.issn2168-6750
dc.identifier.urihttps://pearl.plymouth.ac.uk/handle/10026.1/21523
dc.description.abstract

Advances in distributed computing and virtualization allowed cloud computing to establish itself as a popular data management and storage option for organizations. However, unclear safeguards, practices, as well as the evolution of legislation around privacy and data protection, contribute to data security being one of the main concerns in adopting this paradigm. Another important aspect hindering the absolute success of cloud computing is the ability to ensure the digital identity of users and protect the virtual environment through logical access controls while avoiding the compromise of its authentication mechanism or storage medium. Therefore, this paper proposes a system that addresses data security wherein unauthorized access to data stored in a public cloud is prevented by applying a fragmentation technique and a NoSQL database. Moreover, a system for managing and authenticating users with multimodal biometrics is also suggested along with a mechanism to ensure the protection of biometric features. When compared with encryption, the proposed fragmentation method indicates better latency performance, highlighting its strong potential use-case in environments with lower latency requirements such as the healthcare IT infrastructure.

dc.format.extent1-12
dc.publisherInstitute of Electrical and Electronics Engineers (IEEE)
dc.subject4606 Distributed Computing and Systems Software
dc.subject46 Information and Computing Sciences
dc.subject4604 Cybersecurity and Privacy
dc.titleMedical Systems Data Security and Biometric Authentication in Public Cloud Servers
dc.typejournal-article
dc.typeJournal Article
plymouth.issue99
plymouth.volumePP
plymouth.publisher-urlhttp://dx.doi.org/10.1109/tetc.2023.3271957
plymouth.publication-statusPublished
plymouth.journalIEEE Transactions on Emerging Topics in Computing
dc.identifier.doi10.1109/tetc.2023.3271957
plymouth.organisational-group|Plymouth
plymouth.organisational-group|Plymouth|Faculty of Science and Engineering
plymouth.organisational-group|Plymouth|Faculty of Science and Engineering|School of Engineering, Computing and Mathematics
plymouth.organisational-group|Plymouth|REF 2021 Researchers by UoA
plymouth.organisational-group|Plymouth|Users by role
plymouth.organisational-group|Plymouth|Users by role|Academics
plymouth.organisational-group|Plymouth|REF 2021 Researchers by UoA|UoA11 Computer Science and Informatics
dcterms.dateAccepted2023-04-14
dc.date.updated2023-11-01T17:42:03Z
dc.rights.embargodate2023-11-8
dc.identifier.eissn2168-6750
dc.rights.embargoperiod
rioxxterms.versionofrecord10.1109/tetc.2023.3271957


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record


All items in PEARL are protected by copyright law.
Author manuscripts deposited to comply with open access mandates are made available in accordance with publisher policies. Please cite only the published version using the details provided on the item record or document. In the absence of an open licence (e.g. Creative Commons), permissions for further reuse of content should be sought from the publisher or author.
Theme by 
Atmire NV