Affiliation:
1. Pennsylvania State University – Altoona, USA
Abstract
In the present scenario, the vulnerabilities associated with cloud computing and biometric technology rank among the most vital issues in information security. In this chapter, the primary goal is to investigate the physical and informational security susceptibilities of biometrics, analyze the structure and design possibilities of the cloud, and examine the new developments of biometrics with cloud computing. Foremost, the authors analyze the developments of biometrics and compare the performance based on defining characteristics. In addition, they examine threats and attacks that can compromise the assets of an organization or an individual's sensitive information. Furthermore, this chapter provides a comprehensive discussion on the physical vulnerabilities of biometrics. Moreover, one section of this chapter focuses on the informational and database vulnerabilities. In this chapter, the authors also discuss the design considerations and cloud computing paradigm in relation to biometric security systems.
Reference27 articles.
1. Exploiting virtualization for delivering cloud-based IPTV services
2. Integrating Palmprint and Fingerprint for Identity Verification
3. Cloud Security Alliance. (2013). The Notorious Nine. Washington, DC: Author.
4. Council of European Professional Informatics Societies. (2011). Cloud Computing Security and Privacy Issues. Brussels, Belgium: Author.
5. Biometrics in the cloud.;R.Das;Keesing Journal of Documents and Identity,2013