IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Analyzing the Security Susceptibilities of Biometrics Integrated with Cloud Computing

Analyzing the Security Susceptibilities of Biometrics Integrated with Cloud Computing
View Sample PDF
Author(s): John R. Regola (Pennsylvania State University – Altoona, PA), John K. Mitchell III (Pennsylvania State University – Altoona, PA), Brandon R. Baez (Pennsylvania State University – Altoona, PA)and Syed S. Rizvi (Pennsylvania State University – Altoona, PA)
Copyright: 2015
Pages: 17
Source title: Handbook of Research on Securing Cloud-Based Databases with Biometric Applications
Source Author(s)/Editor(s): Ganesh Chandra Deka (Ministry of Labour and Employment, India)and Sambit Bakshi (National Institute of Technology Rourkela, India)
DOI: 10.4018/978-1-4666-6559-0.ch009

Purchase

View Analyzing the Security Susceptibilities of Biometrics Integrated with Cloud Computing on the publisher's website for pricing and purchasing information.

Abstract

In the present scenario, the vulnerabilities associated with cloud computing and biometric technology rank among the most vital issues in information security. In this chapter, the primary goal is to investigate the physical and informational security susceptibilities of biometrics, analyze the structure and design possibilities of the cloud, and examine the new developments of biometrics with cloud computing. Foremost, the authors analyze the developments of biometrics and compare the performance based on defining characteristics. In addition, they examine threats and attacks that can compromise the assets of an organization or an individual's sensitive information. Furthermore, this chapter provides a comprehensive discussion on the physical vulnerabilities of biometrics. Moreover, one section of this chapter focuses on the informational and database vulnerabilities. In this chapter, the authors also discuss the design considerations and cloud computing paradigm in relation to biometric security systems.

Related Content

Dina Darwish. © 2024. 43 pages.
Kassim Kalinaki, Musau Abdullatif, Sempala Abdul-Karim Nasser, Ronald Nsubuga, Julius Kugonza. © 2024. 23 pages.
Yogita Yashveer Raghav, Ramesh Kait. © 2024. 17 pages.
Renuka Devi Saravanan, Shyamala Loganathan, Saraswathi Shunmuganathan. © 2024. 21 pages.
Veera Talukdar, Ardhariksa Zukhruf Kurniullah, Palak Keshwani, Huma Khan, Sabyasachi Pramanik, Ankur Gupta, Digvijay Pandey. © 2024. 30 pages.
Dharmesh Dhabliya, Sukhvinder Singh Dari, Nitin N. Sakhare, Anish Kumar Dhablia, Digvijay Pandey, Balakumar Muniandi, A. Shaji George, A. Shahul Hameed, Pankaj Dadheech. © 2024. 9 pages.
Avtar Singh, Shobhana Kashyap. © 2024. 11 pages.
Body Bottom