Cloud Security Using Face Recognition

Cloud Security Using Face Recognition

Santosh Kumar, Debanjan Sadhya, Durgesh Singh, S. K. Singh
Copyright: © 2019 |Pages: 23
DOI: 10.4018/978-1-5225-7501-6.ch109
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Establishing identity has become very difficult in the vastly crowded cloud computing environment. The need for a trustworthy cloud authentication phenomenon has increased in the wake of heightened concerns about authentication and rapid advancements in cloud computing, database access, and Internet communication. Face recognition is a non-intrusive method, and facial characteristics are probably most common biometrics features used by humans to identify others. Authentication for cloud computing using face recognition is based on security issues related to data access and cloud database in a cloud. It can provide a satisfactory level of security measures to users and service providers, cloud consumers, and different organizations. In this chapter, the authors cover different research aspects related to cloud security.
Chapter Preview
Top

1. Introduction

In the computing world, clouds have always served a metaphorical approximately supernatural role. It has been used traditionally to represent the internet in a networked environment in diagramming and mapping operations (Hartig, 2009). Cloud security is an evolutionary offshoot of computer security, information security and security of internet based computation, whereby shared resources, different relevant software and information is provided to computers and other devices on demand. The cloud computing security is also known as cloud security. In October 2009 paper representation “Effectively and Securely using the cloud computing paradigm” by Peter Mell and Tim Grance of United States National Institute of Standards and Technologies (NIST) has given the definition of cloud computing: “Cloud computing is a model for enabling ubiquitous, convenient, on demand network access to shared pool of configurable computing resources(e.g., networks, servers, storage, applications, and services) and applications as services that can be rapidly provisioned and released with minimal management effort or service provider interaction” (Mell & Grance, 2011). Cloud computing technology is a new idea, which provides a great opportunities in many areas. It is a collection of computers and servers that are publically accessible via internet (Senthil, Boopal and Vanathi, 2012). Cloud computing allows consumers and businesses to exfoliate different applications without installation and access their personal files at any computer with internet access. Cloud promises to create computing and storage of large-scale analysis knowledge a lot of economical, less time devastating and quite presumably cheaper (Menon, Anala, Gokhale & Sood, 2012). These benefits additionally apply to scientific research knowledge and bioinformatics tools. It provides the variety of internet based on demand services like software, hardware, server, infrastructure and data storage (Ganesh, Sapkal & Korade, 2013). On the other hand, cloud computing could be an important platform to run such tools in parallel because it provides on-demand, elastic computational resources. On the other hand, cloud computing could be an important platform to run such tools in parallel because it provides on-demand, elastic computational resources (Karlsson, Torreño, Ramet, Klambauer, Cano, & Trelles, 2012).

Complete Chapter List

Search this Book:
Reset