Multiple Biometric Security in Cloud Computing
نویسندگان
چکیده
Cloud computing is one of the emerging technologies, that takes network users to the next level. Cloud is a technology where resources are paid per usage rather than owned. One of the biggest challenges in this technology is Security. Though users use service provider’s resources, there is a great level of reluctance from users’ end because of significant security threats packed with this technology. Research in this core has provided a number of solutions to overcome these security barriers; each of these has its own pros and cons. This paper brings about a new model of a security system where in users are to provide multiple biometric finger prints during Enrollment for a service. These templates are stored at the cloud provider’s end. The users are authenticated based on these finger print templates which have to be provided in the order of random numbers that are generated every time. Both finger prints templates and images provided every time are encrypted for enhanced security.
منابع مشابه
A Literature Review on Cloud Computing Security Issues
The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...
متن کاملA Literature Review on Cloud Computing Security Issues
The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...
متن کاملAssessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing
Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...
متن کاملA survey on impact of cloud computing security challenges on NFV infrastructure and risks mitigation solutions
Increased broadband data rate for end users and the cost of resource provisioning to an agreed SLA in telecom service providers, are forcing operators in order to adhere to employment Virtual Network Functions (VNF) in an NFV solution. The newly 5G mobile telecom technology is also based on NFV and Software Define Network (SDN) which inherit opportunities and threats of such constructs. Thus a ...
متن کاملE-Voting security system through Biometric Cloud Computing Integration with virtual server application
Today, biometric cloud security creates a new explosion in technology. With the advent of Cloud Computing biometric security and reliability plays important role in national and international e-governments. In e-voting system, if we incorporated cloud based computing through biometrics then it will create more authentication, transparency and security in voting system. To operate e-voting manag...
متن کاملEnhancing Security of Stored Biometric Template in Cloud Computing Using Fec
Cloud computing is an emerging technology, where services get utilized instead of owning it. It has grown out of an amalgamation of technologies, including service oriented architecture, virtualization, Web 2.0, and utility computing. Most security problems associated with cloud computing which are viewed as problems cast stem from Loss of control, Lack of trust (mechanisms) and Multi-tenancy. ...
متن کامل