Applications of Biometrics in Cloud Security

Topics: Biometrics, Cloud computing, Facial recognition system Pages: 16 (5450 words) Published: April 20, 2013
The success of modern day technologies highly depends on its effectiveness of the world’s norms, its ease of use by end users and most importantly its degree of information security and control. Cloud computing is a style of computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet. Users need not have knowledge of, expertise in, or control over the technology infrastructure ‘in the cloud’ that supports them [15, 16]. Authentication, thus, becomes pretty important for cloud security. Biometric is the most secure and convenient authentication tool. It cannot be borrowed, stolen, or forgotten and forging one is practically impossible. The term comes from the Greek words bios (life) and metrikos (measure). To make a personal recognition, biometrics relies on who you are or what you do—as opposed to what you know. OBJECTIVES

1 To know and understand the meaning of biometric, its uses, the characteristics and also its advantages and challenges. 2 To know and understand the full meaning of cloud computing its type and its service providers 3 To explain the about cloud security and its shortfalls

4 To know how biometric technology can be applied to enhance security in cloud computing

The word “biometrics” comes from the Greek language and is derived from the words bio (life) and metric (to measure).Biometrics (or biometric authentication) refers to the identification of humans by their characteristics or traits. Computer science, biometrics to be specific, is used as a form of identification [1]. Biometrics is automated methods of recognizing a person based on a physiological or behavioural characteristic [2]. Biometrics offers new perspectives in high-security applications while supporting natural, user-friendly and fast authentication. Biometric technology uses these characteristics to identify individuals automatically1. Ideally the characteristic should be universally present, unique to the individual, stable over time and easily measurable [5]. 2.1 Biometric systems

A biometric system provides an automated method of recognizing an individual based on the individual's biometric. A biometric is a measurement of a biological characteristic such as fingerprint, iris pattern, retina image, face or hand geometry; or a behavioural characteristic such as voice, gait or signature. Behavioural biometrics are related to the behaviour of a Person, including but not limited to: typing rhythm, gait, and voice. Some researchers have coined the term behaviourmetrics to describe the behaviour class of biometrics [1]. A biometric system is essentially a pattern-recognition system that recognizes a person based on a feature vector derived from a specific physiological or behavioural characteristic that the person possesses [3]. Biometric systems can be used in two different modes. Identity verification occurs when the user claims to be already enrolled in the system (presents an ID card or login name); in this case the biometric data obtained from the user is compared to the user’s data already stored in the database Identification (also called search) occurs when the identity of the user is a priori unknown. In this case the user’s biometric data is matched against all the records in the database as the user can be anywhere in the database or he/she actually does not have to be there at all [4]. The combination of biometric data systems and biometrics recognition/ identification technologies creates the biometric security systems. 2.2 Biometric Authentication

Authentication on the other hand, is a process where a known person's live biometric is compared to a stored template of that person. For example, an individual’s identity is revealed to the biometric system upon entering a PIN (Personal Identification Number). To authenticate that this is the person associated with this PIN, a live biometric is presented...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Security and privacy challenges in cloud computing Essay
  • Cloud Computing and Security Challenges Essay
  • Security Issues in Cloud Computing Essay
  • Security Implications of Cloud Computing Essay
  • Essay about Security Risks in Cloud Computing
  • Essay on Biometric Security
  • Biometrics and Network Security Essay
  • Assessing the Security Risks of Cloud Computing Essay

Become a StudyMode Member

Sign Up - It's Free