“…Since, by the usage of cloud, distributed access of the data is possible, at the same time, data breaches are also highly possible. In order to safeguard the data, many applications have been coined in the literature which includes methodologies based on cryptography, [1], [2], [3], [4], [5], privacy preserving techniques [6], [7], [8], knowledge based authentication techniques, possession based authentication techniques emit these methods, each one of the methodologies has their own limitations with respect to provision of security [9], [10], [11]. Therefore, to overcome these limitations, methodologies based on biometric authentication has been popular [12], [13], [14].…”