Voice-Authentication Model Based on Deep Learning for Cloud Environment

Ethar Hachim - Mustansiriyah University, Baghdad, 00964, Iraq
Methaq Gaata - Mustansiriyah University, Baghdad, 00964, Iraq
Thekra Abbas - Mustansiriyah University, Baghdad, 00964, Iraq

Citation Format:

DOI: http://dx.doi.org/10.30630/joiv.7.3.1303


Cloud computing is becoming an essential technology for many organizations that are dynamically scalable and employ virtualized resources as a service done over the Internet. The security and privacy of the data stored in the cloud is cloud providers' main target. Every person wants to keep his data safe and store it in a secure place. The user considers cloud storage the best option to keep his data confidential without losing it. Authentication in the trusted cloud environment allows making knowledgeable authorization decisions for access to the protected individual's data. Voice authentication, also known as voice biometrics, depends on an individual's unique voice patterns for identification to access personal and sensitive data. The essential principle for voice authentication is that every person's voice differs in tone, pitch, and volume, which is adequate to make it uniquely distinguishable. This paper uses voice metric as an identifier to determine the authorized customers that can access the data in a cloud environment without risk. The Convolution Neural Network (CNN) architecture is proposed for identifying and classifying authorized and unauthorized people based on voice features. In addition, the 3DES algorithm is used to protect the voice features during the transfer between the client and cloud sides. In the testing, the experimental results of the proposed model achieve a high level of accuracy, reaching about 98%, and encryption efficiency metrics prove the proposed model's robustness against intended attacks to obtain the data.


Cloud Computing; Authentication Protocol; Voice Features; Convolution Neural Network; Cryptography.

Full Text:



M. Aljanabi et al., "Cloud Computing Issues, Challenges, and Needs: A Survey," Int. J. Informatics Vis., vol. 5, no. 3, pp. 298–305, 2021, doi: 10.30630/JOIV.5.3.671.

I. Indu, P. M. R. Anand, and V. Bhaskar, "Identity and access management in cloud environment: Mechanisms and challenges," Eng. Sci. Technol. an Int. J., vol. 21, no. 4, pp. 574–588, 2018, doi: 10.1016/j.jestch.2018.05.010.

L. Megouache, A. Zitouni, and M. Djoudi, "Ensuring user authentication and data integrity in multi-cloud environment," Human-centric Comput. Inf. Sci., vol. 2020, no. 1, p. 10, doi: 10.1186/s13673-020-00224-yï.

J. Mohamed, M. F. Md Fudzee, S. N. Ramli, M. N. Ismail, and - Defni, "Bridging Usability and Accessibility of User Authentication using Usable Accessed (UAce) for Online Payment Applications," JOIV Int. J. Informatics Vis., vol. 5, no. 4, p. 366, Dec. 2021, doi: 10.30630/joiv.5.4.740.

M. Albanese, A. De Benedictis, D. D. J. de Macedo, and F. Messina, "Security and trust in cloud application life-cycle management," Future Generation Computer Systems, vol. 111. 2020, doi: 10.1016/j.future.2020.01.025.

D. Raja, T. Bhalodia, and R. Buch, "Review On Biometric Two-Way Authentication In Cloud Computing," 2020.

N. Sharma, R. Sharma, and N. Jindal, "Machine Learning and Deep Learning Applications-A Vision," Glob. Transitions Proc., vol. 2, no. 1, pp. 24–28, 2021, doi: 10.1016/j.gltp.2021.01.004.

M. Mahmud, M. S. Kaiser, A. Hussain, and S. Vassanelli, "Applications of Deep Learning and Reinforcement Learning to Biological Data," IEEE Trans. Neural Networks Learn. Syst., vol. 29, no. 6, pp. 2063–2079, 2018, doi: 10.1109/TNNLS.2018.2790388.

M. M. Taye, "Theoretical Understanding of Convolutional Neural Network: Concepts, Architectures, Applications, Future Directions," Computation, vol. 11, no. 3, p. 52, Mar. 2023, doi: 10.3390/computation11030052.

S. T. Ahmed and S. M. Kadhem, "Using Machine Learning via Deep Learning Algorithms to Diagnose the Lung Disease Based on Chest Imaging: A Survey," Int. J. Interact. Mob. Technol., vol. 15, no. 16, pp. 95–112, 2021, doi: 10.3991/ijim.v15i16.24191.

L. Abed, N. Clarke, B. Ghita, and A. Alruban, "Securing cloud storage by transparent biometric cryptography," Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 11359 LNCS, pp. 97–108, 2019, doi: 10.1007/978-3-030-12942-2_9.

T. Sudhakar and M. Gavrilova, "Cancelable Biometrics Using Deep Learning as a Cloud Service," IEEE Access, vol. 8, pp. 112932–112943, 2020, doi: 10.1109/ACCESS.2020.3003869.

Omer Ahmed Hedaia, Ahmed Shawish, Essam H. Houssein, and Hala Zayed, "Bio-CAPTCHA Voice-Based Authentication Technique for Better Security and Usability in Cloud Computing ," Int. J. Serv. Sci. Manag. Eng. Technol. , vol. 11, no. 2, pp. 59–79, 2020.

A. Phipps, K. Chiazzane, and V. Vassilev, "Your password is music to my ears: Cloud based authentication using sound," Proc. Conflu. 2021 11th Int. Conf. Cloud Comput. Data Sci. Eng., pp. 227–232, 2021, doi: 10.1109/Confluence51648.2021.9377126.

K. M. Vinoth, K. Venkatachalam, P. Prabu, A. Almutairi, and M. Abouhawwash, "Secure biometric authentication with de-duplication on distributed cloud storage," PeerJ Comput. Sci., vol. 7, pp. 1–20, 2021, doi: 10.7717/PEERJ-CS.569.

M. I. Mihailescu and S. L. Nita, "A Searchable Encryption Scheme with Biometric Authentication and Authorization for Cloud Environments," Cryptography, vol. 6, no. 1, pp. 1–22, 2022, doi: 10.3390/cryptography6010008.

W. Jia, M. Sun, J. Lian, and S. Hou, "Feature dimensionality reduction: a review," Complex Intell. Syst., vol. 8, no. 3, pp. 2663–2693, 2022, doi: 10.1007/s40747-021-00637-x.

D. Anggraeni, W. S. M. Sanjaya, M. Y. S. Nurasyidiek, and M. Munawwaroh, "The Implementation of Speech Recognition using Mel-Frequency Cepstrum Coefficients (MFCC) and Support Vector Machine (SVM) method based on Python to Control Robot Arm," IOP Conf. Ser. Mater. Sci. Eng., vol. 288, no. 1, 2018, doi: 10.1088/1757-899X/288/1/012042.

A. B. Abdusalomov, F. Safarov, M. Rakhimov, B. Turaev, and T. K. Whangbo, "Improved Feature Parameter Extraction from Speech Signals Using Machine Learning Algorithm," Sensors, vol. 22, no. 21, Nov. 2022, doi: 10.3390/s22218122.

A. A. Hezam, S. A. Mostafa, Z. Baharum, A. Alanda, and M. Z. Salikon, "Combining Deep Learning Models for Enhancing the Detection of Botnet Attacks in Multiple Sensors Internet of Things Networks," JOIV Int. J. Informatics Vis., vol. 5, no. 4, p. 380, Dec. 2021, doi: 10.30630/joiv.5.4.733.

S. Kiranyaz, O. Avci, O. Abdeljaber, T. Ince, M. Gabbouj, and D. J. Inman, "1D convolutional neural networks and applications: A survey," Mech. Syst. Signal Process., vol. 151, p. 107398, 2021, doi: 10.1016/j.ymssp.2020.107398.

K. Limniotis, "Cryptography as the means to protect fundamental human rights," Cryptography, vol. 5, no. 4. MDPI, Dec. 2021, doi: 10.3390/cryptography5040034.

M. T. Gençoğlu and M. T. Gençoğlu, "Importance of Cryptography in Information Security," ISOR J. Comput. Eng., vol. 21, no. 1, pp. 65–68, 2019, doi: 10.9790/0661-2101026568.

C. Atika Sari, E. H. Rachmawanto, and C. A. Haryanto, "Cryptography Triple Data Encryption Standard (3DES) for Digital Image Security," Sci. J. Informatics, vol. 5, no. 2, pp. 105–117, 2018, doi: 10.15294/sji.v5i2.14844.

L. K. Yee and C. C. Wen, "Secret channel using video steganography," Int. J. Informatics Vis., vol. 1, no. 4–2, pp. 240–245, 2017, doi: 10.30630/joiv.1.4-2.71.

Anna Berger and Sergey A. Guda, "Threshold optimization for F measure of macro- averaged precision and recall," Pattern Recognit., vol. 102, pp. 107–250, 2020.

M. T. Gaata, M. T. Younis, J. N. Hasoon, and S. A. Mostafa, "Hessenberg factorization and firework algorithms for optimized data hiding in digital images," J. Intell. Syst., vol. 31, no. 1, pp. 440–453, 2022, doi: 10.1515/jisys-2022-0029.

B. J. Saleh, A. Y. F. Saedi, A. T. Q. Al-Aqbi, and L. A. Salman, "Optimum median filter based on crow optimization algorithm," Baghdad Sci. J., vol. 18, no. 3, pp. 614–627, 2021, doi: 10.21123/BSJ.2021.18.3.0614.

Logs Dongyu, Sixuan Wu, and Mingcai Hou, "Fully connected deep network: An improved method to predict TOC of shale reservoirs from well logs," Mar. Pet. Geol., vol. 132, pp. 105–205, 2021.

A. Ben-Naim, "Entropy and Time," Entropy, vol. 22, no. 4, 2020, doi: 10.3390/E22040430.