Affiliation:
1. Indian Institute of Technology, India
Abstract
Establishing identity has become very difficult in the vastly crowded cloud computing environment. The need for a trustworthy cloud authentication phenomenon has increased in the wake of heightened concerns about authentication and rapid advancements in cloud computing, database access, and Internet communication. Face recognition is a non-intrusive method, and facial characteristics are probably most common biometrics features used by humans to identify others. Authentication for cloud computing using face recognition is based on security issues related to data access and cloud database in a cloud. It can provide a satisfactory level of security measures to users and service providers, cloud consumers, and different organizations. In this chapter, the authors cover different research aspects related to cloud security.
Reference42 articles.
1. Al-Aqrabi, H., Liu, L., Xu, J., Hill, R., Antonopoulos, N., & Zhan, Y. (2012). Investigation of IT security and compliance challenges in security as-a-service for cloud computing. In Proceedings of IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing Workshops (ISORCW), (pp. 124–129). IEEE.
2. Amazon: Amazon Virtual Private Cloud (Amazon VPC). (2012). Retrieved from http://aws.amazon.com/vpc/
3. Everything as a Service: Powering the New Information Economy
4. Banirostam, H., Shamsinezhad, E., & Banirostam, T. (2013). Functional Control of Users by Biometric Behavior Features in Cloud Computing. In Proceedings of Intelligent Systems Modelling & Simulation (ISMS). ISMS.
5. Brodkin, J. (2008). Gartner: Seven cloud-computing security risks. Gartner.