Biometric Authentication for the Cloud Computing

Biometric Authentication for the Cloud Computing

Sumit Jaiswal, Santosh Kumar, Subhash Chandra Patel, R. S. Singh, S. K. Singh
DOI: 10.4018/978-1-4666-6559-0.ch001
(Individual Chapters)
No Current Special Offers


As the data being stored to a distant server away from direct control of user cloud presents various security risks and threat issues associated with the user authentication and access control mechanisms, it is of upmost importance to ensure the security of confidential business data in the cloud storage along with making sure that only properly authenticated and authorized personnel can access the data and applications in the cloud. An important step in this regard is to execute biometric security mechanisms, which increases the competence level of security and only permits authenticated individuals by verifying different biometric parameters of human biometric characteristics (traits): patterns like fingerprints, retina, iris, voice, face, ear, palm, signature, and DNA recognition. Implementation of biometric authentication mechanism will take security of data and access control in cloud to higher level. This chapter discusses how a proposed biometrics system with respect to other recognition systems so far is more advantageous and result-oriented because it does not work on presumptions: it is unique and provides fast and contact-less authentication.
Chapter Preview

1. Introduction

Cloud Computing can be considered a new perspective way of services based utility computing where a business enterprise needs to pay only for the services needed, apart from putting effort into technical details of setting up an entire infrastructure or requiring licensing for an entire business software. Cloud computing has changed the way people’s perception about services and computing. Cloud computing has the provision of allocating the computing power, storage resources, network resources to multiple clients in a real time scenario.

In October 2009 paper representation “Effectively and Securely using the Cloud Computing Paradigm” by Peter Mell and Tim Grance of United States National Institute of Standards and Technologies (NIST) has given the definition of cloud computing: “Cloud computing is a model for enabling ubiquitous, convenient, on demand network access to shared pool of configurable computing resources(e.g., networks, servers, storage, applications, and services) and applications as services that can be rapidly provisioned and released with minimal management effort or service provider interaction” (Mell & Grance, 2009). As compared to traditional model of computing where setting up an entire infrastructure for start-up companies is a tedious task of its own, apart from being costly and requirement of technical expertise. Cloud computing takes care of these issues by transforming all the resources to a distant data centre of shared pool of computing resources. It elevates the customers from the problems of purchasing and maintaining the entire IT infrastructure and let them to focus primarily on their business issues.

Cloud computing reduces the cost of any business organization by providing scalable, configuring devices (randomly provisioned as per the changing needs of demand by business). Cloud computing uses the concept of utility computing, providing services (storage, software, platform) as per the requirements thereby leveraging them from bothering about other unnecessary technical issues.

NIST defined the standard definition of cloud computing consisting of following essential characteristics:

  • 3 service models i.e. Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS);

  • 4 deployment models i.e. private cloud, community cloud, public cloud and hybrid cloud;

  • 5 essential features include virtualized computing resource pool, broad network access, rapid elasticity, on-demand self-service, measured service.

IaaS provides the storage services, distant secure storage services Eg. Amazon S3. PaaS deploys the operations over the platform suitable for creation of applications Eg. Google App Engine. SaaS is based on rental model of pay as you use mechanism. It includes properietry software usage, thereby solving the licensing trouble for theorganisations. Eg. Microsoft Office 365.

Cloud Computing comprises the shared pool of configurable computing resources enabling ubiquitous, on-demand deploying applications and storage services which is cheap and less complex than on-premises IT infrastructure deployment of computing resources. The services involve PaaS, IaaS, SaaS.

Figure 1 depicts the model of cloud computing as the stack of these essential features.

Figure 1.

NIST cloud computing model


Cloud Computing enables a convenient, on-demand network access, to a shared pool of configurable computing resources (e.g. networks, servers, storage, applications, and services) that can be rapidly provisioned to the businesses and released with minimal management effort or service provider interaction (Mell & Grance, 2009), which in turn makes the overall overhead much smaller than the traditional computing.

Key Terms in this Chapter

Verification Mode: In the verification, where the subject claims an identity and given input image is matched up to against that of the claimed identity via their respective feature sets in order to validate the claim.

Identification Mode: In the identification mode, where the subject (people) does not claim an identity, the input user image is compared against a set of labeled (it is used to indicate that the identity of the images in the database is known) user images in a database in order to determine the best match and, therefore, its identity.

Access Control: Set of verification attributes which when authenticated against the individual’s parameters define the permission of access in the given context.

Cloud Computing: Cloud computing is a expression used to explain a diversity of computing concepts that involve a large number of computers connected through a real-time communication network such as the Internet.

Complete Chapter List

Search this Book: