Cloud Security Using Face Recognition

Cloud Security Using Face Recognition

Santosh Kumar, Debanjan Sadhya, Durgesh Singh, S. K. Singh
DOI: 10.4018/978-1-4666-6559-0.ch014
(Individual Chapters)
No Current Special Offers


Establishing identity has become very difficult in the vastly crowded cloud computing environment. The need for a trustworthy cloud authentication phenomenon has increased in the wake of heightened concerns about authentication and rapid advancements in cloud computing, database access, and Internet communication. Face recognition is a non-intrusive method, and facial characteristics are probably most common biometrics features used by humans to identify others. Authentication for cloud computing using face recognition is based on security issues related to data access and cloud database in a cloud. It can provide a satisfactory level of security measures to users and service providers, cloud consumers, and different organizations. In this chapter, the authors cover different research aspects related to cloud security.
Chapter Preview

1. Introduction

In the computing world, clouds have always served a metaphorical approximately supernatural role. It has been used traditionally to represent the internet in a networked environment in diagramming and mapping operations (Hartig, 2009). Cloud security is an evolutionary offshoot of computer security, information security and security of internet based computation, whereby shared resources, different relevant software and information is provided to computers and other devices on demand. The cloud computing security is also known as cloud security. In October 2009 paper representation “Effectively and Securely using the cloud computing paradigm” by Peter Mell and Tim Grance of United States National Institute of Standards and Technologies (NIST) has given the definition of cloud computing: “Cloud computing is a model for enabling ubiquitous, convenient, on demand network access to shared pool of configurable computing resources(e.g., networks, servers, storage, applications, and services) and applications as services that can be rapidly provisioned and released with minimal management effort or service provider interaction” (Mell & Grance, 2011). Cloud computing technology is a new idea, which provides a great opportunities in many areas. It is a collection of computers and servers that are publically accessible via internet (Senthil, Boopal and Vanathi, 2012). Cloud computing allows consumers and businesses to exfoliate different applications without installation and access their personal files at any computer with internet access. Cloud promises to create computing and storage of large-scale analysis knowledge a lot of economical, less time devastating and quite presumably cheaper (Menon, Anala, Gokhale & Sood, 2012). These benefits additionally apply to scientific research knowledge and bioinformatics tools. It provides the variety of internet based on demand services like software, hardware, server, infrastructure and data storage (Ganesh, Sapkal & Korade, 2013). On the other hand, cloud computing could be an important platform to run such tools in parallel because it provides on-demand, elastic computational resources. On the other hand, cloud computing could be an important platform to run such tools in parallel because it provides on-demand, elastic computational resources (Karlsson, Torreño, Ramet, Klambauer, Cano, & Trelles, 2012).

Key Terms in this Chapter

Biometrics: Biometric system is a pattern recognition based system. It acquires biometric data from an individual, extracts a salient feature set from the data, compares feature set against the feature set(s) stored in the database, and executes an action based on the result of the comparison.

Identification: In identification mode of biometric system, the system performs a one-to-many comparison against a biometric database in attempt to establish the identity of an unknown individual.

Integrity: Integrity can be associated with data, software and hardware. Integrity refers to demonstrate the data in same initial form as it was earlier before any authorized modification has done thus by avoiding any imposter or unauthorized modification.

Biometric Enrollment Process: During the enrollment, biometric information from an individual is captured and stored. In subsequent uses, biometric information is detected and compared with the information stored at the time of enrollment.

Complete Chapter List

Search this Book: