Wednesday 10 August 2016

Biometric Authentication in Cloud Computing

Abstract:Information and telecommunication technology (ICT) has penetrated deep into the human lives and is affecting human life style in different aspects. The rapid growth in ICT has embarked improvement in computing devices and computing techniques. Currently cloud computing is one of the most hyped innovation. It has several positive impactslike reduce cost, increase throughput, ease of use but it also have certainsecurity issues that must be dealt with carefully. There are several techniques that can be used to overcome this major problem. In this paper will analyses biometric authentication in cloud computing, its various techniques and how they are helpful in reducing the security threats. It provides a comprehensive and structured overview of biometric authentication for enhancing cloud security.

Biometric Authentication in Cloud Computing

Description:For the ease of users, concept of cloud computing took popularity in 1990’s though its concepts lasts back to 1960s. Cloud Computing refers to provision of scalable and IT related services to the users through internet. It is a technique of computing in which dynamically scalable and IT related resources are provided as a service through Internet. 


This model permits general, supportive, on-interest system right to use to a common group of configurable figuring assets. These resources are rapidly allocated and unconfined with a minor organization’s effort. Resources may include systems, servers, application programs or any kind of administrative programs.

It provides 3 different kinds of service models:
1. Software as a service has the ability to provide user any software running on a cloud substructure.
2. Platform can also be provided as a service. In this any kind of platform (i.e. tools, library, services).
3. Infrastructure as a service facilitates the user by providing computing resources where user can run the software without having control on underlying infrastructure but has control over the operating system being used.

Four deployment models are used in cloud computing:
2. Community cloud is shared by several users.
3. Private cloud facilitates a private organization.
4. Hybrid cloud structure consists of two or more than two cloud models.

No comments:

Post a Comment