Corpus ID: 28476142

A Survey On Biometric Security Technologies From Cloud Computing Perspective

@article{Ratnam2016ASO,
  title={A Survey On Biometric Security Technologies From Cloud Computing Perspective},
  author={Shivashish Ratnam and Mimzee Gupta and Ajay Shanker Singh and Karupagouder Thirunavukkarasu},
  journal={International Journal of Scientific \& Technology Research},
  year={2016},
  volume={5},
  pages={22-24}
}
Cloud computing is one of the rising technologies, that takes set of connections users to the next level. Cloud is a technology where resources are paid as per usage rather than owned. One of the major challenges in this technology is Security. Biometric systems provide the answer to ensure that the rendered services are accessed only by a legal user or an authorized user and no one else. Biometric systems recognize users based on behavioral or physiological characteristics. The advantages of… Expand

Figures and Topics from this paper

A Study of Different Biometric Authentication Techniques in Cloud Computing
TLDR
This paper is a brief overview of different biometric authentication techniques used in cloud computing with their proposed methods and advantages. Expand
A Hybrid Privacy Preserving Scheme Using Finger Print Detection in Cloud Environment
TLDR
The evidence of the outcomes suggests that the proposed technique ensures relatively improved security and privacy of data in the cloud system as compared to some recent state-of-art methods. Expand

References

SHOWING 1-7 OF 7 REFERENCES
Blind Authentication: A Secure Crypto-Biometric Verification Protocol
TLDR
Experimental results on four biometric datasets show that carrying out the authentication in the encrypted domain does not affect the accuracy, while the encryption key acts as an additional layer of security. Expand
Enhancing security and privacy in biometrics-based authentication systems
TLDR
The inherent strengths of biometrics-based authentication are outlined, the weak links in systems employing biometric authentication are identified, and new solutions for eliminating these weak links are presented. Expand
Towards Continuous Cloud Service Assurance for Critical Infrastructure IT
TLDR
This work presents an investigation of assurance approaches, an analysis of their suitability for Critical Infrastructure Services being deployed in the Cloud and presents their approach. Expand
Enterprise Knowledge Clouds: Next Generation KM Systems?
  • K. Delic, J. A. Riley
  • Computer Science
  • 2009 International Conference on Information, Process, and Knowledge Management
  • 2009
TLDR
The current state of the Enterprise Knowledge Management field is assessed, the possible emergence of Enterprise Knowledge Clouds is project and possible developments in the next five to fifteen years are concluded. Expand
CLOUD FORENSICS : CHALLENGES ONLY AHEAD ”
  • Cyber Times International Journal of Technology & Management
NIST Special Publication 800-145 "The NIST Definition Cloud Computing
    The NIST Definition of CloudComputing
    • NIST Special Publication