Analyzing the security susceptibilities of biometrics integrated with cloud computing

John R. Regola, John K. Mitchell, Brandon R. Baez, Syed S. Rizvi

Research output: Chapter in Book/Report/Conference proceedingChapter

Abstract

In the present scenario, the vulnerabilities associated with cloud computing and biometric technology rank among the most vital issues in information security. In this chapter, the primary goal is to investigate the physical and informational security susceptibilities of biometrics, analyze the structure and design possibilities of the cloud, and examine the new developments of biometrics with cloud computing. Foremost, the authors analyze the developments of biometrics and compare the performance based on defining characteristics. In addition, they examine threats and attacks that can compromise the assets of an organization or an individual's sensitive information. Furthermore, this chapter provides a comprehensive discussion on the physical vulnerabilities of biometrics. Moreover, one section of this chapter focuses on the informational and database vulnerabilities. In this chapter, the authors also discuss the design considerations and cloud computing paradigm in relation to biometric security systems.

Original languageEnglish (US)
Title of host publicationHandbook of Research on Securing Cloud-Based Databases with Biometric Applications
PublisherIGI Global
Pages192-208
Number of pages17
ISBN (Electronic)9781466665606
ISBN (Print)1466665599, 9781466665590
DOIs
StatePublished - Oct 31 2014

All Science Journal Classification (ASJC) codes

  • Computer Science(all)

Fingerprint Dive into the research topics of 'Analyzing the security susceptibilities of biometrics integrated with cloud computing'. Together they form a unique fingerprint.

  • Cite this

    Regola, J. R., Mitchell, J. K., Baez, B. R., & Rizvi, S. S. (2014). Analyzing the security susceptibilities of biometrics integrated with cloud computing. In Handbook of Research on Securing Cloud-Based Databases with Biometric Applications (pp. 192-208). IGI Global. https://doi.org/10.4018/978-1-4666-6559-0.ch009