Cloud Security Using Ear Biometrics

Cloud Security Using Ear Biometrics

Santosh Kumar (Indian Institute of Technology, India), Ali Imam Abidi (Indian Institute of Technology, India) and Sanjay Kumar Singh (Indian Institute of Technology, India)
DOI: 10.4018/978-1-4666-9466-8.ch037


Cloud computing has created much enthusiasm in the IT world, institutions, business groups and different organizations and provided new techniques to cut down resource costs and increase its better utilization. It is a major challenge for cloud consumers and service providers equally. Establishing one's identity has become complicated in a vastly interconnected cloud computing network. The need of a consistent cloud security technique has increased in the wake of heightened concerns about security. The rapid development in cloud data storage, network computing services, accessing the cloud services from vendors has made cloud open to security threats. In this chapter, we have proposed an approach based on Ear Biometric for cloud security of individual consumers and vendors. This approaches started to get acceptance as a genuine method for determining an individual's identity. This chapter provides with the stepping stone for future researches to unveil how biometrics can change the cloud security scenario as we know it.
Chapter Preview

1. Introduction

Cloud computing security is an evolutionary offshoot of computer security, information security and security of internet based computation, whereby shared resources, different relevant software and information is provided to computers and other devices on demand. Cloud computing has rapidly become one of the most prominent concept in the IT world due to its innovative model of computing as based on their utility. It promises increased flexibility, scalability and reliability, while promising decreased operational and support costs. However, many potential cloud users are reluctant to move to cloud computing on a large scale due to the unaddressed security issues present in cloud computing. In October 2009 paper representation “Effectively and Securely using the Cloud Computing Paradigm” by Peter Mell and Tim Grance of United States National Institute of Standards and Technologies (NIST) has given the definition of cloud computing: “Cloud computing is a model for enabling ubiquitous, convenient, on demand network access to shared pool of configurable computing resources(e.g., networks, servers, storage, applications, and services) and applications as services that can be rapidly provisioned and released with minimal management effort or service provider interaction” (Mell, & Grance, 2009). Cloud security emphasizes on the main objective of the a broad set of policies for different issues, new trend of technologies and to control deployments to protected cloud database like shared resources, different essential software, information of different organizations (academics, Industries and different Vendors) and provide a complete level of security to infrastructure (may be very complex) of cloud computing.

Complete Chapter List

Search this Book: