Analyzing the Security Susceptibilities of Biometrics Integrated with Cloud Computing

Analyzing the Security Susceptibilities of Biometrics Integrated with Cloud Computing

John R. Regola, John K. Mitchell III, Brandon R. Baez, Syed S. Rizvi
ISBN13: 9781466665590|ISBN10: 1466665599|EISBN13: 9781466665606
DOI: 10.4018/978-1-4666-6559-0.ch009
Cite Chapter Cite Chapter

MLA

Regola, John R., et al. "Analyzing the Security Susceptibilities of Biometrics Integrated with Cloud Computing." Handbook of Research on Securing Cloud-Based Databases with Biometric Applications, edited by Ganesh Chandra Deka and Sambit Bakshi, IGI Global, 2015, pp. 192-208. https://doi.org/10.4018/978-1-4666-6559-0.ch009

APA

Regola, J. R., Mitchell III, J. K., Baez, B. R., & Rizvi, S. S. (2015). Analyzing the Security Susceptibilities of Biometrics Integrated with Cloud Computing. In G. Deka & S. Bakshi (Eds.), Handbook of Research on Securing Cloud-Based Databases with Biometric Applications (pp. 192-208). IGI Global. https://doi.org/10.4018/978-1-4666-6559-0.ch009

Chicago

Regola, John R., et al. "Analyzing the Security Susceptibilities of Biometrics Integrated with Cloud Computing." In Handbook of Research on Securing Cloud-Based Databases with Biometric Applications, edited by Ganesh Chandra Deka and Sambit Bakshi, 192-208. Hershey, PA: IGI Global, 2015. https://doi.org/10.4018/978-1-4666-6559-0.ch009

Export Reference

Mendeley
Favorite

Abstract

In the present scenario, the vulnerabilities associated with cloud computing and biometric technology rank among the most vital issues in information security. In this chapter, the primary goal is to investigate the physical and informational security susceptibilities of biometrics, analyze the structure and design possibilities of the cloud, and examine the new developments of biometrics with cloud computing. Foremost, the authors analyze the developments of biometrics and compare the performance based on defining characteristics. In addition, they examine threats and attacks that can compromise the assets of an organization or an individual's sensitive information. Furthermore, this chapter provides a comprehensive discussion on the physical vulnerabilities of biometrics. Moreover, one section of this chapter focuses on the informational and database vulnerabilities. In this chapter, the authors also discuss the design considerations and cloud computing paradigm in relation to biometric security systems.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.