Handbook of Research on Securing Cloud-Based Databases with Biometric Applications - Advances in Information Security, Privacy, and Ethics
Latest Publications


TOTAL DOCUMENTS

21
(FIVE YEARS 0)

H-INDEX

2
(FIVE YEARS 0)

Published By IGI Global

9781466665590, 9781466665606

Author(s):  
Subashis Mohapatra ◽  
Banshidhar Majhi

Cloud computing has many issues related to privacy, security, scalability, elasticity, and efficiency. Load balancing is one of the vexing issues in cloud computing. Load balancing ensures that all processors in the system have approximately an equal amount of work at any instance of time. In this chapter, the authors analyze some load-balancing algorithms and compare their performances using cloud analyst. Lots of references are added for the benefit of readers.


Author(s):  
Bhavana Butani ◽  
Piyush Kumar Shukla ◽  
Sanjay Silakari

Wireless sensor networks are utilized in vital situations like military and commercial applications, traffic surveillance, habitat monitoring, and many other applications. WSNs have to face various issues and challenges in terms of memory, communication, energy, computation, and storage, which require efficient management of huge amount of sensor data. Therefore, storage is an important issue in the WSN. Emergence of Sensor-Cloud infrastructure overcomes several shortcomings of WSN such as storage capacity and offers high processing capabilities for huge sensor data. Security is also the major challenge that is faced by the sensor network. This chapter includes a brief overview of the importance of cloud computing in sensor networks and the goal of DDoS and Node Capture Attack in WSN. This chapter includes descriptions of different modeling techniques of Node Capture attack and various detection and key pre-distribution schemes to invent a new technique to improve network resilience against node capture attacks.


Author(s):  
Suresh Veluru ◽  
Yogachandran Rahulamathavan ◽  
B. B. Gupta ◽  
Muttukrishnan Rajarajan

An e-mail address is a source of communication for major social networking sites. In general, e-mail addresses hold identity in the form a surname as a substring in it. Identities such as names are far from random and can exhibit community distributions over populations. However, these identities reflect cultural, ethnic, and genetic structures generated among populations. Hence, identity establishment in e-mail address mining can be seen as a categorization of e-mail address-based community structure in names data set. It involves community modeling in names, categorization of an e-mail addresses, and identity privacy preservation. This chapter presents a survey of text mining and privacy preserving techniques followed by research challenges and strategies in name analysis. The research challenges are: (1) e-mail address categorization based on community structure of identities, (2) correlation of surnames and forenames within and across communities, and (3) privacy preserving of identities in communities.


Author(s):  
Natasha Csicsmann ◽  
Victoria McIntyre ◽  
Patrick Shea ◽  
Syed S. Rizvi

Strong authentication and encryption schemes help cloud stakeholders in performing the robust and accurate cloud auditing of a potential service provider. All security-related issues and challenges, therefore, need to be addressed before a ubiquitous adoption of cloud computing. In this chapter, the authors provide an overview of existing biometrics-based security technologies and discuss some of the open research issues that need to be addressed for making biometric technology an effective tool for cloud computing security. Finally, this chapter provides a performance analysis on the use of large-scale biometrics-based authentication systems for different cloud computing platforms.


Author(s):  
John R. Regola ◽  
John K. Mitchell III ◽  
Brandon R. Baez ◽  
Syed S. Rizvi

In the present scenario, the vulnerabilities associated with cloud computing and biometric technology rank among the most vital issues in information security. In this chapter, the primary goal is to investigate the physical and informational security susceptibilities of biometrics, analyze the structure and design possibilities of the cloud, and examine the new developments of biometrics with cloud computing. Foremost, the authors analyze the developments of biometrics and compare the performance based on defining characteristics. In addition, they examine threats and attacks that can compromise the assets of an organization or an individual's sensitive information. Furthermore, this chapter provides a comprehensive discussion on the physical vulnerabilities of biometrics. Moreover, one section of this chapter focuses on the informational and database vulnerabilities. In this chapter, the authors also discuss the design considerations and cloud computing paradigm in relation to biometric security systems.


Author(s):  
Mainak Adhikari ◽  
Sukhendu Kar

NoSQL database provides a mechanism for storage and access of data across multiple storage clusters. NoSQL dabases are finding significant and growing industry to meet the huge data storage requirements of Big data, real time applications, and Cloud Computing. NoSQL databases have lots of advantages over the conventional RDBMS features. NoSQL systems are also referred to as “Not only SQL” to emphasize that they may in fact allow Structured language like SQL, and additionally, they allow Semi Structured as well as Unstructured language. A variety of NoSQL databases having different features to deal with exponentially growing data intensive applications are available with open source and proprietary option mostly prompted and used by social networking sites. This chapter discusses some features and challenges of NoSQL databases and some of the popular NoSQL databases with their features on the light of CAP theorem.


Author(s):  
Abdul Wahid ◽  
Mohatesham Pasha Quadri ◽  
Ahmad Talha Siddiqui ◽  
Mudasir M. Kirmani ◽  
Khaleel Ahmad

A Distributed Cloud Storage Provider (DCSP) is used for managing the client's data. However, the platform is vulnerable to security attacks, which results in huge losses of client data. The confidential data in an enterprise system may be illegally accessed through a remote interface provided by a heterogeneous-cloud and archives. The data may be lost or tampered with when it is stored in a storage pool outside the enterprise on a cloud. To achieve reliability, consistency, security, and confidentiality of user information Kerberos Protocol is used. The Kerberos protocol is designed to provide reliable authentication over open and insecure networks. The symmetric-key cryptography is maintained for transaction over the network. In this chapter, a cooperative Key-Distribution Center (KDC) scheme is proposed to support dynamic scalability on multiple storage servers. The results of the research work show that KDC provides effective security properties required by Kerberos protocol to mitigate the impact of various attacks in any cloud.


Author(s):  
Malavika Jayanand ◽  
M. Anil Kumar ◽  
K. G. Srinivasa ◽  
G. M. Siddesh

In order to store these huge bulks of data, organizations have to buy servers and scale it according to their need. One of the solution for storage would be Cloud Environment as there is no need to scale up storage by aggregating more physical servers, installing, updating, or to run backups, which also cuts down system hardware and makes application integration easier. This chapter discusses key concepts of cloud storage as storage as a solution for Bigdata, different big data domains, and its application with case studies of how organizations are leveraging Bigdata for better business opportunities.


Author(s):  
G. M. Siddesh ◽  
K. G. Srinivasa ◽  
L. Tejaswini

Security in cloud is to be increased to strengthen the confidence and trust of cloud service consumers. In the upcoming years, the scientific research and education teams will have to investigate finding new ways to handle the issue of cloud security. This chapter discusses the major threats and their impact on clouds, security measures to handle the attacks in clouds, security as a service in research and education, and steps to enhance security feature in clouds.


Author(s):  
Sumit Jaiswal ◽  
Santosh Kumar ◽  
Subhash Chandra Patel ◽  
R. S. Singh ◽  
S. K. Singh

As the data being stored to a distant server away from direct control of user cloud presents various security risks and threat issues associated with the user authentication and access control mechanisms, it is of upmost importance to ensure the security of confidential business data in the cloud storage along with making sure that only properly authenticated and authorized personnel can access the data and applications in the cloud. An important step in this regard is to execute biometric security mechanisms, which increases the competence level of security and only permits authenticated individuals by verifying different biometric parameters of human biometric characteristics (traits): patterns like fingerprints, retina, iris, voice, face, ear, palm, signature, and DNA recognition. Implementation of biometric authentication mechanism will take security of data and access control in cloud to higher level. This chapter discusses how a proposed biometrics system with respect to other recognition systems so far is more advantageous and result-oriented because it does not work on presumptions: it is unique and provides fast and contact-less authentication.


Sign in / Sign up

Export Citation Format

Share Document