Biometrics in Cloud Computing

Biometrics in Cloud Computing

Mainak Adhikari (IMPS College of Engineering and Technology, India)
DOI: 10.4018/978-1-4666-6559-0.ch013
OnDemand PDF Download:
No Current Special Offers


Biometric-based authentication is automatic identity verification, based on individual physiological or behavioural characteristics, such as fingerprints, voice, face, iris, etc. Over the next few years, the amount of biological data will increase rapidly and require enormous amounts of storage space and huge processing power. To face those challenges, the Service Providers are looking towards a distributed approach, Cloud Computing, which can improve the Quality of Service (QoS) of overall systems and handle the challenges quite efficiently with its unlimited storage space, and parallel processing power, using the help of virtualization technology and rapid data distribution capacity. This chapter presents the important standards and recommendation of Biometric Services in Cloud Platform and elaborates the potential value of Cloud-Based Biometric Services by presenting two important case studies.
Chapter Preview


Authentication is the act of confirming the truth of attribute of a datum or entity. This might involve confirming the identity of a person or software program, tracing the origins of an artefact or ensuring that a product is what it’s packaging and labelling claim to be. In case of authenticated people still use what he/she has (email-id, ph. No., ATM), what he/she knows (password, PIN) and he/she is (Face, Iris). Nevertheless, the main problem of these approaches is that each user may have more than one account, and each account has a unique password, which may be forgettable by the user, or different users may use same username and password for the multiple sites. To achieve verification that is more reliable or identification a possible solution can be found in the use of Biometrics.

The term Biometrics comes from Greek words “Bio” means “life and “Metric” means “to measure”. Biometrics is the science and technology of measuring and analysing biological data. Biometric-based authentication is an automated method for recognizing individuals based on measurable biological and behavioural characteristics. To determine or verify a person, biometric identification system uses physiological characteristics (Face, Hand Geometry, Iris, retina recognition) or behavioural characteristics (Voice, Keystroke on keyboard, digital Signature) of the person. Since biometric is not possible to forge and it cannot be forgotten or stolen by anyone. Biometric authentication offers a convenient, accurate, irreplaceable and high secure alternative for an individual, which makes it, has advantages over traditional cryptography-based authentication schemes. Biometric data is the private information, which has no need to be remembered all the time and cannot be replaced like password. Biometric information is uniquely and permanently associated with a person. A biometric system can be either an 'identification' system or a 'verification' (authentication) system. The main issue of Biometric technology is to handle huge amount of biological data, which, required sufficient storage space and significant processing power in the system.

The main solution is to move the existing Biometric technology to a Cloud platform that ensure appropriate scalability, sufficient amount of storage, use virtualization, parallel processing capabilities and widespread availability of devices that provides an accessible entry point for various applications and services that rely on the three types of clients- Thin clients, Thick clients and Mobile clients. Hence, Cloud computing is capable of addressing issues related to the Biometric technology, but at the same time, offers new application possibilities for the existing generation of Biometric systems.

However, Biometric technology in Cloud is a nontrivial task. Developer attempt to tackle this task must be aware of the following challenges:

  • 1.

    The most common challenges and obstacles encountered when moving the technology to a Cloud platform.

  • 2.

    Standard and recommendations pertaining to both Cloud-based services as well as Biometrics in general.

  • 3.

    Existing solutions that can be analysed for examples of good practices.

This chapter provides some basic guidelines on how to move the Biometric technology in Cloud platform. This chapter also describe some basic about Biometric technology and Cloud computing. Additionally it presents two case studies on some important Biometric technologies in the Cloud platform. Sufficient references are given for the benefit of readers.


Biometric Service

Biometric recognition systems represent pattern recognition systems, capable of recognizing individuals based on their physiological or behavioural traits. These traits are considered to be unique to each individual and unlike knowledge or token-based security mechanisms cannot be forgotten, lost or stolen. Biometric system is categorising into two parts: Identification system and Verification (‘Authentication’) system.

  • Identification: One to Many: Biometric system can be used to identify a person without his/her knowledge or consent about the data. For example, scanning a crowd with a camera using face recognition technology, one can identify a person using a known database.

  • Verification: One to One: Biometrics can also be used to verify the identity of a person. For example, one can grant to access a secure area of a building by using the finger scans or one can grant to access a bank account at an ATM by using retinal scan method.

Key Terms in this Chapter

Verification: Verification is any means by which a person can be uniquely indentified by evaluating one or more distinguishing biological traits. The oldest form of biometrics verification is fingerprint analysis. Biometric verification has advanced considerably with the advent of computerized databases and the digitization of analog data, allowing almost instantaneous personal identification. Verification systems verifying that an individual is the person that they claim to be, based upon validating a sample collected biometric sample for the individual. Verification systems are generally described as a 1 to 1 matching systems, because the system tries to match the biometric presented by the individual against a specific biometric already on file.

Security: Security is the degree of resistance to, or protection from, harm. It applies to any vulnerable and valuable asset, such as person, dwelling, community, nation or organization. Computer security is information security as applies to computing services such as computers and smart phones, as well as computer networks such as private and public networks, including the internet as a whole.

Parallel Processing: Parallel processing is the ability of the barrier to simultaneous process incoming stimuli of differing quality. Parallel processing is the simultaneous use of more than one CPU or processor core to execute programs or multiple computational threads. Parallel processing makes program run faster because there are more engines running it. Several different form of parallel computing: bit-level, instruction level, data and task parallelism.

Cryptography: Biometric cryptosystems combine cryptography and biometrics to benefit from the strengths of both fields. In such systems while cryptography provides high and adjustable security levels, biometric brings in non-repudiation and eliminates the need of remember passwords or to carry token etc. cryptography does not become moribund and succumb to the vicissitudes of haute couture and coiffure, ciphers, hashing algorithms are data encryption will remain the under pinning of identification, authentication, protection and verification technologies.

Identification: Biometrics identification is used as a form of identification and access control. It is also used to identify individuals in groups that are under surveillance. Biometrics identifiers are the distinctive, measurable characteristics used to label and describe individuals. Hair colour and height of a person are the simple examples of biometric information, but for identification purposes hair colour and height are not very useful, because those are change relatively rapidly (hair colour is changed by sunshine or by age and height of a person is varies in day by day).

DNA Matching: Human has 23 pairs of chromosomes containing their DNA blueprint. One member of each chromosomal pair comes from their mother, and the other comes from their father. Genes make up 5 percent of the human genone. The other 95 percent are non-coding sequences. In non-coding regions there are identical repeat sequences of DNA, which can be repeated anywhere from one to 30 times in row. These regions are called variable number tandem repeats (VNTRs). The chance of 2 individuals sharing the same DNA profile is less than one in a hundred billion with 26 different bands studied.

Complete Chapter List

Search this Book: