Biometric Authentication for Cloud Computing

Biometrics ◽  
2017 ◽  
pp. 205-232
Author(s):  
Tarunpreet Bhatia ◽  
A. K. Verma

Cloud computing is a way of providing unlimited storage capacity and enhancing parallel processing capabilities without investing in new infrastructure or licensing new software. Designing a secure data access for cloud computing platform is a big challenge as more and more information is placed over cloud by individuals and companies. It is not enough to authenticate a device, or even a user to a device. Cloud computing requires a level of trust that can only be possible through biometric identity assurance, as biometrics offer the unique ability to bind an identity to an actual user, not just to a logical or physical token or credential. This chapter evaluates cloud security by identifying unique security requirements and attempts to present viable solutions based on biometrics to eliminate possible threats. It provides a comprehensive and structured overview of biometric authentication for enhancing cloud security.

Author(s):  
Tarunpreet Bhatia ◽  
A. K. Verma

Cloud computing is a way of providing unlimited storage capacity and enhancing parallel processing capabilities without investing in new infrastructure or licensing new software. Designing a secure data access for cloud computing platform is a big challenge as more and more information is placed over cloud by individuals and companies. It is not enough to authenticate a device, or even a user to a device. Cloud computing requires a level of trust that can only be possible through biometric identity assurance, as biometrics offer the unique ability to bind an identity to an actual user, not just to a logical or physical token or credential. This chapter evaluates cloud security by identifying unique security requirements and attempts to present viable solutions based on biometrics to eliminate possible threats. It provides a comprehensive and structured overview of biometric authentication for enhancing cloud security.


2012 ◽  
Vol 263-266 ◽  
pp. 2015-2019
Author(s):  
Hongli Wu ◽  
Yong Hui Jiang

“Cloud Computing” technology has very big advantage in the computing power, scalability, reliability and cost etc. “Cloud Security "and " Cloud Storage " is one of the two main research fields. This paper puts forward “filter cloud” strategies of filter spam messages based on "Cloud Security" in order to achieve the purpose of filtering spam messages by addressing its root causes. It is a new attempt that applying “Cloud Computing” in spam messages filter and more mobile business would move to "cloud computing" platform in the future.


2022 ◽  
Vol 1216 (1) ◽  
pp. 012001
Author(s):  
G R Tsochev ◽  
R I Trifonov

Abstract Cloud computing is a new technology that is undergoing tremendous development today. People who use it are not able to separate the reasonable from the unreasonable arguments that come with the security requirements in the cloud. The claim that cloud computing is hereditarily insecure is as absurd as the claim that cloud computing does not create new security problems. Cloud computing is a way to dynamically increase resources without the need for in-depth knowledge of a brand new infrastructure, without training new workers or designing new software solutions. The article aims to analyse the different cloud security issues and models of cloud architectures. Some of the main problems with security in virtualization, concerns about storing data in the cloud and the assessment of risk tolerance in cloud computing are presented. Legal and regulatory issues for the protection of personal data are addressed.


2012 ◽  
Vol 35 (6) ◽  
pp. 1262 ◽  
Author(s):  
Ke-Jiang YE ◽  
Zhao-Hui WU ◽  
Xiao-Hong JIANG ◽  
Qin-Ming HE

2020 ◽  
Vol 29 (2) ◽  
pp. 1-24
Author(s):  
Yangguang Li ◽  
Zhen Ming (Jack) Jiang ◽  
Heng Li ◽  
Ahmed E. Hassan ◽  
Cheng He ◽  
...  

Neuroforum ◽  
2021 ◽  
Vol 0 (0) ◽  
Author(s):  
Michael Hanke ◽  
Franco Pestilli ◽  
Adina S. Wagner ◽  
Christopher J. Markiewicz ◽  
Jean-Baptiste Poline ◽  
...  

Abstract Decentralized research data management (dRDM) systems handle digital research objects across participating nodes without critically relying on central services. We present four perspectives in defense of dRDM, illustrating that, in contrast to centralized or federated research data management solutions, a dRDM system based on heterogeneous but interoperable components can offer a sustainable, resilient, inclusive, and adaptive infrastructure for scientific stakeholders: An individual scientist or laboratory, a research institute, a domain data archive or cloud computing platform, and a collaborative multisite consortium. All perspectives share the use of a common, self-contained, portable data structure as an abstraction from current technology and service choices. In conjunction, the four perspectives review how varying requirements of independent scientific stakeholders can be addressed by a scalable, uniform dRDM solution and present a working system as an exemplary implementation.


Sign in / Sign up

Export Citation Format

Share Document