Cloud Security Using Ear Biometrics

Cloud computing has created much enthusiasm in the IT world, institutions, business groups and different organizations and provided new techniques to cut down resource costs and increase its better utilization. It is a major challenge for cloud consumers and service providers equally. Establishing one’s identity has become complicated in a vastly interconnected cloud computing network. The need of a consistent cloud security technique has increased in the wake of heightened concerns about security. The rapid development in cloud data storage, network computing services, accessing the cloud services from vendors has made cloud open to security threats. In this chapter, we have proposed an approach based on Ear Biometric for cloud security of individual consumers and vendors. This approaches started to get acceptance as a genuine method for determining an individual’s identity. This chapter provides with the stepping stone for future researches to unveil how biometrics can change the cloud security scenario as we know it.

[1]  Marios D. Dikaiakos,et al.  Cloud Computing: Distributed Internet Computing for IT and Scientific Research , 2009, IEEE Internet Computing.

[2]  Yoshiaki Katayama,et al.  Cloud Cognitive Authenticator (CCA): A public cloud computing authentication mechanism , 2013, 2013 International Conference on Informatics, Electronics and Vision (ICIEV).

[3]  Arun Ross,et al.  A survey on ear biometrics , 2013, CSUR.

[4]  Alex Pentland,et al.  View-based and modular eigenspaces for face recognition , 1994, 1994 Proceedings of IEEE Conference on Computer Vision and Pattern Recognition.

[5]  Khalid T. Al-Sarayreh,et al.  A Novel Approach to Build a Generic Model of Photovoltaic Solar System Using Sound Biometric Techniques , 2014, Int. J. Inf. Technol. Web Eng..

[6]  V. K. Agrawal,et al.  Multi-level authentication technique for accessing cloud services , 2012, 2012 International Conference on Computing, Communication and Applications.

[7]  Shin-Jer Yang,et al.  Design Role-Based Multi-tenancy Access Control Scheme for Cloud Services , 2013, 2013 International Symposium on Biometrics and Security Technologies.

[8]  R. Jantz,et al.  Anthropological Dermatoglyphic Research , 1987 .

[9]  Zhuang Jin-lia Research on Cloud Computing Security , 2014 .

[10]  James L. Wayman,et al.  Fundamentals of Biometric Authentication Technologies , 2001, Int. J. Image Graph..

[11]  S Ramgovind,et al.  The management of security in Cloud computing , 2010, 2010 Information Security for South Africa.

[12]  Yongzhao Zhan,et al.  Investigation of IT Security and Compliance Challenges in Security-as-a-Service for Cloud Computing , 2012, 2012 IEEE 15th International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing Workshops.

[13]  Markus Jakobsson,et al.  Authentication in the clouds: a framework and its application to mobile users , 2010, CCSW '10.

[14]  Craig Standing The Requirements of Methodologies for Developing Web Applications , 2001, ECIS.

[15]  Dengguo Feng,et al.  Study on Cloud Computing Security: Study on Cloud Computing Security , 2011 .

[16]  Anil K. Jain,et al.  An Introduction to Biometric Authentication Systems , 2005 .

[17]  Cyril Onwubiko,et al.  Security Issues to Cloud Computing , 2010, Cloud Computing.

[18]  R. Jantz,et al.  Variation among European populations in summary finger ridge-count variables. , 1997, Annals of human biology.

[19]  Randy H. Katz,et al.  Above the Clouds: A Berkeley View of Cloud Computing , 2009 .

[20]  M. Turk,et al.  Eigenfaces for Recognition , 1991, Journal of Cognitive Neuroscience.

[21]  Arun Ross,et al.  Handbook of Biometrics , 2007 .

[22]  Y. S. Moon,et al.  Recent advances in ear biometrics , 2004, Sixth IEEE International Conference on Automatic Face and Gesture Recognition, 2004. Proceedings..

[23]  Xiaoping Wu,et al.  Cloud Computing System Based on Trusted Computing Platform , 2010, 2010 International Conference on Intelligent Computation Technology and Automation.

[24]  Ghassan Issa,et al.  Demand-Driven Algorithm for Sharing and Distribution of Photovoltaic Power in a Small Local Area Grid , 2014, Int. J. Inf. Technol. Web Eng..

[25]  Thomas Sandholm,et al.  What's inside the Cloud? An architectural map of the Cloud landscape , 2009, 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing.

[26]  Shucheng Yu,et al.  Efficient privacy-preserving biometric identification in cloud computing , 2013, 2013 Proceedings IEEE INFOCOM.

[27]  Dimitrios Katsaros,et al.  Architectural Requirements for Cloud Computing Systems: An Enterprise Cloud Approach , 2011, Journal of Grid Computing.

[28]  Siani Pearson,et al.  Privacy and Security for Cloud Computing , 2012, Computer Communications and Networks.

[29]  Chandrakant D. Patel,et al.  Everything as a Service: Powering the New Information Economy , 2011, Computer.

[30]  Guy Gouardères,et al.  E-Portfolio to Promote the Virtual Learning Group Communities on the Grid , 2006, Int. J. Inf. Technol. Web Eng..

[31]  Bhavani M. Thuraisingham,et al.  Security Issues for Cloud Computing , 2010, Int. J. Inf. Secur. Priv..

[32]  Schahram Dustdar,et al.  DEMODS: A Description Model for Data-as-a-Service , 2012, 2012 IEEE 26th International Conference on Advanced Information Networking and Applications.

[33]  Weimin Wei,et al.  A Deep Understanding of Cloud Computing Security , 2012 .

[34]  Holger Regenbrecht,et al.  Increased Popularity Through Compliance with Usability Guidelines in E-Learning Web Sites , 2009, Int. J. Inf. Technol. Web Eng..

[35]  Hai Jin,et al.  Anonymous Password Authentication Scheme by Using Digital Signature and Fingerprint in Cloud Computing , 2012, 2012 Second International Conference on Cloud and Green Computing.

[36]  Chunming Rong,et al.  A Secure Data Access Mechanism for Cloud Tenants , 2012, CLOUD 2012.

[37]  Sharath Pankanti,et al.  Biometrics: a grand challenge , 2004, ICPR 2004.

[38]  Ping Wang,et al.  A New Fingerprint Authentication Scheme based on Secret-splitting for Cloud Computing Security , 2011 .

[39]  Takaya Yuizono,et al.  Study on individual recognition for ear images by using genetic local search , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).