Al-Assam, Hisham and Hassan, Waleed (2019) Automated Biometric Authentication with Cloud Computing. In: Biometric-Based Physical and Cybersecurity Systems. Springer, Cham, pp. 455-475.
Text (Automated Biometric Authentication with Cloud Computing)
978-3-319-98734-7_18 - Accepted Version Restricted to Repository staff only Download (90kB) |
||
|
Text
Al-Assam2019AutomatedBiometricAuthenticationWithCloudComputing.pdf Download (2MB) | Preview |
Abstract
The convenience provided by cloud computing has led to an increasing trend of many business organizations, government agencies and individual customers to migrate their services and data into cloud environments. However, once clients’ data is migrated, the overall security control will be immedicably shifted form data owners to the hand of cloud service providers. In fact, most cloud clients do not even know where their data is physically stored, and therefore the question of how to limit data access to authorized users has been one of the biggest challenges in cloud environments. Although security tokens and passwords are widely used form of remote user authentication, they can be lost or stolen as they are not linked with the identity of data owner. Therefore, biometric based authentication can potentially offer a practical and reliable option for remote access control. This chapter starts with a brief introduction that covers the fundamental concepts of cloud computing and biometric based authentication. It then provides and in-depth discussions on authentication challenges for the cloud computing environment and the limitation of traditional solutions. This leads to the key sections related to biometric solutions for cloud computing in which we present state-of-art approaches that offer convenient and privacy-preserving authentication needed for cloud environment. The chapter argues that addressing privacy concerns surrounding the use of biometrics in cloud computing is one of the key challenges that has to be an integral part of any viable solution for any biometric-based authentication. It also argues that assuring cloud clients that their biometric templates will not be used without their permission to, for example, track them is not enough. Such solutions should make it technically infeasible to do so even if a cloud service provider wants to. This chapter explains a number of interesting solutions that have been recently proposed to improve security and, at the same time, maintain user privacy. Finally, we identify some challenges that still need to be addressed and highlight relevant Research Directions.
Item Type: | Book Section |
---|---|
Uncontrolled Keywords: | Cloud computing Remote biometric authentication Fuzzy identity-based encryption Multifactor authentication |
Subjects: | Q Science > QA Mathematics > QA75 Electronic computers. Computer science Q Science > QA Mathematics > QA76 Computer software |
Divisions: | School of Computing |
Depositing User: | Hisham Al Assam |
Date Deposited: | 07 Feb 2019 15:34 |
Last Modified: | 07 Feb 2019 15:34 |
URI: | http://bear.buckingham.ac.uk/id/eprint/317 |
Actions (login required)
View Item |