Cloud Security Using Face Recognition

Establishing identity has become very difficult in the vastly crowded cloud computing environment. The need for a trustworthy cloud authentication phenomenon has increased in the wake of heightened concerns about authentication and rapid advancements in cloud computing, database access, and Internet communication. Face recognition is a non-intrusive method, and facial characteristics are probably most common biometrics features used by humans to identify others. Authentication for cloud computing using face recognition is based on security issues related to data access and cloud database in a cloud. It can provide a satisfactory level of security measures to users and service providers, cloud consumers, and different organizations. In this chapter, the authors cover different research aspects related to cloud security.

[1]  G. Nolan,et al.  Computational solutions to large-scale data management and analysis , 2010, Nature Reviews Genetics.

[2]  Günter Klambauer,et al.  Enabling Large-Scale Bioinformatics Data Analysis with Cloud Computing , 2012, 2012 IEEE 10th International Symposium on Parallel and Distributed Processing with Applications.

[3]  Jacques M. Bahi,et al.  A Complete Security Framework for Wireless Sensor Networks: Theory and Practice , 2015, Int. J. Inf. Technol. Web Eng..

[4]  Shin-Jer Yang,et al.  Design Role-Based Multi-tenancy Access Control Scheme for Cloud Services , 2013, 2013 International Symposium on Biometrics and Security Technologies.

[5]  Jameela Al-Jaroodi,et al.  An Efficient Fault-Tolerant Algorithm for Distributed Cloud Services , 2012, 2012 Second Symposium on Network Cloud Computing and Applications.

[6]  Khalid Al-Begain,et al.  Quality of Service for Multimedia and Real-Time Services , 2010, Int. J. Inf. Technol. Web Eng..

[7]  Brij Bhooshan Gupta,et al.  Smart XSS Attack Surveillance System for OSN in Virtualized Intelligence Network of Nodes of Fog Computing , 2017, Int. J. Web Serv. Res..

[8]  Ganesh Chandra Deka,et al.  A Survey of Cloud Database Systems , 2014, IT Professional.

[9]  Kenneth J. Knapp,et al.  Key issues in data center security: An investigation of government audit reports , 2011, Gov. Inf. Q..

[10]  Omar Banimelhem,et al.  An Energy-Balanced Cluster-Based Protocol for Wireless Sensor Networks , 2013, Int. J. Inf. Technol. Web Eng..

[11]  Christian Senk,et al.  Biometric authentication as a service for enterprise identity management deployment: a data protection perspective , 2011, 2011 Sixth International Conference on Availability, Reliability and Security.

[12]  Bhavani M. Thuraisingham,et al.  Security Issues for Cloud Computing , 2010, Int. J. Inf. Secur. Priv..

[13]  Schahram Dustdar,et al.  DEMODS: A Description Model for Data-as-a-Service , 2012, 2012 IEEE 26th International Conference on Advanced Information Networking and Applications.

[14]  Markus Jakobsson,et al.  Controlling data in the cloud: outsourcing computation without outsourcing control , 2009, CCSW '09.

[15]  Yannis Manolopoulos,et al.  Indexing Techniques for Web Access Logs , 2004 .

[16]  T. Banirostam,et al.  Functional Control of Users by Biometric Behavior Features in Cloud Computing , 2013, 2013 4th International Conference on Intelligent Systems, Modelling and Simulation.

[17]  Hong Tang,et al.  Voiceprint-biometric template design and authentication based on cloud computing security , 2011, 2011 International Conference on Cloud and Service Computing.

[18]  R. Vanathi,et al.  Improving the Security of Cloud Computing using Trusted Computing Technology , 2012 .

[19]  Chandrakant D. Patel,et al.  Everything as a Service: Powering the New Information Economy , 2011, Computer.

[20]  Timothy Grance,et al.  Guidelines on Security and Privacy in Public Cloud Computing | NIST , 2012 .

[21]  Theo Huibers,et al.  How Interface Design and Search Strategy Influence Children’s Search Performance and Evaluation , 2014 .

[22]  Toby Velte,et al.  Cloud Computing, A Practical Approach , 2009 .

[23]  James L. Wayman,et al.  Technical Testing and Evaluation of Biometric Identification Devices , 1996 .

[24]  Chen-Nee Chuah,et al.  Routing-as-a-Service (RaaS): A framework For tenant-directed route control in data center , 2011, INFOCOM 2011.

[25]  Dimitrios Katsaros,et al.  Architectural Requirements for Cloud Computing Systems: An Enterprise Cloud Approach , 2011, Journal of Grid Computing.

[26]  K. Menon,et al.  Cloud computing: Applications in biological research and future prospects , 2012, 2012 International Conference on Cloud Computing Technologies, Applications and Management (ICCCTAM).

[27]  Arun Ross,et al.  An introduction to biometrics , 2008, ICPR 2008.

[28]  N. Raghavendra Rao Enterprise Management Strategies in the Era of Cloud Computing , 2015 .

[29]  Marios D. Dikaiakos,et al.  Cloud Computing: Distributed Internet Computing for IT and Scientific Research , 2009, IEEE Internet Computing.

[30]  V. Joshi,et al.  Three tier data storage security in cloud using Face fuzzy vault , 2012, 2012 International Conference on Computing, Communication and Applications.

[31]  Yongzhao Zhan,et al.  Investigation of IT Security and Compliance Challenges in Security-as-a-Service for Cloud Computing , 2012, 2012 IEEE 15th International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing Workshops.

[32]  Naixue Xiong,et al.  A Fingerprint Recognition Scheme Based on Assembling Invariant Moments for Cloud Computing Communications , 2011, IEEE Systems Journal.

[33]  Tor-Morten Grønli,et al.  Performance Evaluation of a Modern Web Architecture , 2013, Int. J. Inf. Technol. Web Eng..

[34]  José Luis Alba Castro,et al.  Secure crypto-biometric system for cloud computing , 2011 .

[35]  James L. Wayman,et al.  Fundamentals of Biometric Authentication Technologies , 2001, Int. J. Image Graph..

[36]  Alfred C. Weaver,et al.  Biometric authentication , 2006, Computer.

[37]  Mikhail Khitrov,et al.  Talking passwords: voice biometrics for data access and security , 2013 .

[38]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .