Biometric Approach for Confidentiality in Cloud Computing
Main Article Content
Abstract
Nowadays, progress in technology have made life simple by giving us higher levels of knowledge through the innovation of various devices. However, all technical invention harbours the potential of invisible threats to its users. One leading danger is theft of private information and data. As digital database get more prevailing, user’s attempt to prevent their data with extremely encrypted Identity cards and passwords. However, the abuse and theft of these security measures are on the rise. Taking benefit of security fault in Identity cards result in the cards gets duplicated and get misused. This increasing conflict of the cyber safety has lead to the start of biometric security method. Defining the main variation between the methods of biometric system used to verify user identity will focus on the benefits and limitations of personal data security systems.
Downloads
Download data is not yet available.
Article Details
How to Cite
Mishra, P., & Singh, D. (2018). Biometric Approach for Confidentiality in Cloud Computing. SAMRIDDHI : A Journal of Physical Sciences, Engineering and Technology, 10(01), 65-70. https://doi.org/10.18090/samriddhi.v10i01.9
Section
Research Article

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
References
[1] Lifeng Lai, Sui Wai Ho and H. Vicent Poor “Privacy
Security Trade-Offs in Biometric Security Systems
- Part 2:Multi Use Case” [Lai. 2011] EEE
Transactions on Information Forensic and Security,
Vol 6, No.1, March 2011
[2] Paul Reid, “Biometrics for network security”, Pearson Education Inc [Reid, 2011], ISBN 0131015494.
[3] Sandra Maestre, Sean Nichols “DNA Biometrics”,
2009
[4] Massimo Tistarelli and Marks Nixon, “Advances In Biometrics”,[Tistarelli, 2009] Springer-Verlag Berlin Heidelberg 2009.
[5] Jain, A.K.; Ross, A.; Pankanti, S., “Biometrics: a tool for information security”[Jain, 2006] Volume: 1 Issue: 2,Issue Date:June 2006, page(s): 125 – 143.
[6] Khalid Saeed-Jerzy Pejas-Romuald Mosdorf, “Biometrics, Computer Security, Systems and Artificial Intelligent Applications”,[Mosdorf, 2006],S pringer-Verlag Berlin Heidelberg 2006, ISBN 0387362320.
[7] Nalluri, S. K., & Parasaram, V. K. B. (2015). Automating Software Builds with Jenkins: Design Patterns and Failure Handling. International Journal of Technology, Management and Humanities, 1(01), 16-33. https://doi.org/10.21590/ijtmh.01.02.03
[8] Nalluri, S. K., & Parasaram, V. K. B. (2015). Automating Software Builds with Jenkins: Design Patterns and Failure Handling. International Journal of Technology, Management and Humanities, 1(02), 16-33.
[9] Lorrie Faith Cranor, Simson Garfinkel, “Security and usability: designing secure systems that people can use” [Cransor, 2005], O‟Reilly Media, Inc., 2005, ISBN 0596008279.
[10] Jain, A.K.;Ross, A.;Prabhakar, S.;”An introduction to biometric recognition” [Jain, 2004],Volume: 14 Issue: 1 Issue Date:Jan. 2004, on page(s): 4 – 20.
[11] Michael E. Schuckers, “Some Statistical Aspects of Biometric Identification Device Performance”, 2001
[12] John D. Woodward (Jr.), United States. Army, Arroyo Center “What concerns do biometrics raise and how do they differ from concerns about other identification methods?”,[Woodward, 2001],Army biometric applications:identifying and addressing sociocultural concerns, 2001.
[13] New Mexico, Department of Health “Fingerprint Techniques Manual what.pmd”http://dhi.health. state. nm. us/elibrary/ cchspmanual/fingerpr int_manual.pdf
Security Trade-Offs in Biometric Security Systems
- Part 2:Multi Use Case” [Lai. 2011] EEE
Transactions on Information Forensic and Security,
Vol 6, No.1, March 2011
[2] Paul Reid, “Biometrics for network security”, Pearson Education Inc [Reid, 2011], ISBN 0131015494.
[3] Sandra Maestre, Sean Nichols “DNA Biometrics”,
2009
[4] Massimo Tistarelli and Marks Nixon, “Advances In Biometrics”,[Tistarelli, 2009] Springer-Verlag Berlin Heidelberg 2009.
[5] Jain, A.K.; Ross, A.; Pankanti, S., “Biometrics: a tool for information security”[Jain, 2006] Volume: 1 Issue: 2,Issue Date:June 2006, page(s): 125 – 143.
[6] Khalid Saeed-Jerzy Pejas-Romuald Mosdorf, “Biometrics, Computer Security, Systems and Artificial Intelligent Applications”,[Mosdorf, 2006],S pringer-Verlag Berlin Heidelberg 2006, ISBN 0387362320.
[7] Nalluri, S. K., & Parasaram, V. K. B. (2015). Automating Software Builds with Jenkins: Design Patterns and Failure Handling. International Journal of Technology, Management and Humanities, 1(01), 16-33. https://doi.org/10.21590/ijtmh.01.02.03
[8] Nalluri, S. K., & Parasaram, V. K. B. (2015). Automating Software Builds with Jenkins: Design Patterns and Failure Handling. International Journal of Technology, Management and Humanities, 1(02), 16-33.
[9] Lorrie Faith Cranor, Simson Garfinkel, “Security and usability: designing secure systems that people can use” [Cransor, 2005], O‟Reilly Media, Inc., 2005, ISBN 0596008279.
[10] Jain, A.K.;Ross, A.;Prabhakar, S.;”An introduction to biometric recognition” [Jain, 2004],Volume: 14 Issue: 1 Issue Date:Jan. 2004, on page(s): 4 – 20.
[11] Michael E. Schuckers, “Some Statistical Aspects of Biometric Identification Device Performance”, 2001
[12] John D. Woodward (Jr.), United States. Army, Arroyo Center “What concerns do biometrics raise and how do they differ from concerns about other identification methods?”,[Woodward, 2001],Army biometric applications:identifying and addressing sociocultural concerns, 2001.
[13] New Mexico, Department of Health “Fingerprint Techniques Manual what.pmd”http://dhi.health. state. nm. us/elibrary/ cchspmanual/fingerpr int_manual.pdf