Cloud Security Using Ear Biometrics

Cloud Security Using Ear Biometrics

Santosh Kumar (Indian Institute of Technology, India), Ali Imam Abidi (Indian Institute of Technology, India) and Sanjay Kumar Singh (Indian Institute of Technology, India)
Copyright: © 2015 |Pages: 26
DOI: 10.4018/978-1-4666-8387-7.ch003
OnDemand PDF Download:
$30.00
List Price: $37.50

Abstract

Cloud computing has created much enthusiasm in the IT world, institutions, business groups and different organizations and provided new techniques to cut down resource costs and increase its better utilization. It is a major challenge for cloud consumers and service providers equally. Establishing one's identity has become complicated in a vastly interconnected cloud computing network. The need of a consistent cloud security technique has increased in the wake of heightened concerns about security. The rapid development in cloud data storage, network computing services, accessing the cloud services from vendors has made cloud open to security threats. In this chapter, we have proposed an approach based on Ear Biometric for cloud security of individual consumers and vendors. This approaches started to get acceptance as a genuine method for determining an individual's identity. This chapter provides with the stepping stone for future researches to unveil how biometrics can change the cloud security scenario as we know it.
Chapter Preview
Top

1. Introduction

Cloud computing security is an evolutionary offshoot of computer security, information security and security of internet based computation, whereby shared resources, different relevant software and information is provided to computers and other devices on demand. Cloud computing has rapidly become one of the most prominent concept in the IT world due to its innovative model of computing as based on their utility. It promises increased flexibility, scalability and reliability, while promising decreased operational and support costs. However, many potential cloud users are reluctant to move to cloud computing on a large scale due to the unaddressed security issues present in cloud computing. In October 2009 paper representation “Effectively and Securely using the Cloud Computing Paradigm” by Peter Mell and Tim Grance of United States National Institute of Standards and Technologies (NIST) has given the definition of cloud computing: “Cloud computing is a model for enabling ubiquitous, convenient, on demand network access to shared pool of configurable computing resources(e.g., networks, servers, storage, applications, and services) and applications as services that can be rapidly provisioned and released with minimal management effort or service provider interaction” (Mell, & Grance, 2009). Cloud security emphasizes on the main objective of the a broad set of policies for different issues, new trend of technologies and to control deployments to protected cloud database like shared resources, different essential software, information of different organizations (academics, Industries and different Vendors) and provide a complete level of security to infrastructure (may be very complex) of cloud computing.

Key Terms in this Chapter

Ear Recognition: is non –intrusive methodology and attributes are probably the most common biometric feature used by humans to recognize one other.

Principal Component Analysis: It is unsupervised dimension reduction approach for large database size. It is used to find the Eigen values for face recognition.

Biometric Profile: Information used to represent an individual or group in an information system.

Biometric System: It is a pattern recognition based system. It acquires biometric data from an individual, extracts a salient feature set from the data, compares feature set against the feature set(s) stored in the database, and executes an action based on the result of the comparison.

Identification Process: In identification mode, where the subject (people/object) does not claim an identity, the input ear image is compared against a set of labeled (it is used to indicate that the identity of the images in the database is known) ear images in a database in order to determine the best match and, therefore, its identity.

Biometrics: Biometrics” means “life measurement” but the term is usually associated with the use of unique physiological characteristics to identify an individual.

Verification Process: One to One matching process: Biometrics can also be used to verify a person's identity. For example, one can grant physical access to a secure area in a building by using finger scans or can grant access to a bank account at an ATM by using retinal scan.

Biometric Traits: Class of phenotypic characteristics (e.g., face or stripe pattern) used as source for constructing a biometric profile.

Cloud Computing Security: It is an evolutionary offshoot of computer security, information security and security of internet based computation, whereby shared resources, different relevant software and information is provided to computers and other devices on demand.

Complete Chapter List

Search this Book:
Reset