Muutke küpsiste eelistusi

Handbook of Research on Securing Cloud-Based Databases with Biometric Applications [Kõva köide]

Edited by , Edited by
Teised raamatud teemal:
Teised raamatud teemal:
"This book explores the latest innovations in promoting cloud security through human authentication techniques by exploring methods of access by identification, including the analysis of facial features, fingerprints, DNA, dental characteristics, and voice patterns"--

Computer and information scientists describe various biometric authentication technologies with a focus on cloud databases and deliberate on research trends and applications of biometrics in security. Among the topics are recent trends in cloud computing security issues and their mitigation, an efficient KDC scheme for verifiable response in heterogeneous cloud storage, analyzing the security susceptibilities of biometrics integrated with cloud computing, trusted cloud-based and femtocell-based biometric authentication for mobile networks, and detecting and preventing intrusion into the flow of big data using bacterial foraging. The information could be useful for practitioners, researchers, and students in information technology security, bioinformatics, and cloud computing. Annotation ©2015 Ringgold, Inc., Portland, OR (protoview.com)

Cloud technologies have revolutionized the way we store information and perform various computing tasks. With the rise of this new technology, the ability to secure information stored on the cloud becomes a concern. The Handbook of Research on Securing Cloud-Based Databases with Biometric Applications explores the latest innovations in promoting cloud security through human authentication techniques. Exploring methods of access by identification, including the analysis of facial features, fingerprints, DNA, dental characteristics, and voice patterns, this publication is designed especially for IT professionals, academicians, and upper-level students seeking current research surrounding cloud security.
Preface xx
Introduction xxvi
Chapter 1 Biometric Authentication for the Cloud Computing
1(15)
Sumit Jaiswal
Santosh Kumar
Subhash Chandra Patel
R. S. Singh
S. K. Singh
Chapter 2 Recent Trends in Cloud Computing Security Issues and Their Mitigation
16(31)
G. M. Siddesh
K. G. Srinivasa
L. Tejaswini
Chapter 3 Security Architecture for Cloud Computing
47(25)
Robin Singh Bhadoria
Chapter 4 Big Data Computing Strategies
72(19)
Malavika Jayanand
M. Anil Kumar
K. G. Srinivasa
G. M. Siddesh
Chapter 5 Verifiable Response in Heterogeneous Cloud Storage: An Efficient KDC Scheme
91(18)
Abdul Wahid
Mohatesham Pasha Quadri
Ahmad Talha Siddiqui
Mudasir M. Kirmani
Khaleel Ahmad
Chapter 6 NoSQL Databases
109(44)
Mainak Adhikari
Sukhendu Kar
Chapter 7 Cloud Database Security Issues and Challenges
153(21)
Ganesh Chandra Deka
Chapter 8 BDS: Browser Dependent XSS Sanitizer
174(18)
Shashank Gupta
B. B. Gupta
Chapter 9 Analyzing the Security Susceptibilities of Biometrics Integrated with Cloud Computing
192(17)
John R. Regola
John K. Mitchell III
Brandon R. Baez
Syed S. Rizvi
Chapter 10 Biometric Authentication for Cloud Computing
209(27)
Tarunpreet Bhatia
A. K. Verma
Chapter 11 Cloud Security: Implementing Biometrics to Help Secure the Cloud
236(15)
Natasha Csicsmann
Victoria McIntyre
Patrick Shea
Syed S. Rizvi
Chapter 12 Biometric: Authentication and Service to Cloud
251(18)
Ajay Rawat
Shivani Gambhir
Chapter 13 Biometrics in Cloud Computing
269(29)
Mainak Adhikari
Chapter 14 Cloud Security Using Face Recognition
298(22)
Santosh Kumar
Debanjan Sadhya
Durgesh Singh
S. K. Singh
Chapter 15 Trusted Cloud- and Femtocell-Based Biometric Authentication for Mobile Networks
320(17)
Debashis De
Anwesha Mukherjee
Srimoyee Bhattacherjee
Payel Gupta
Chapter 16 ECG-Based Biometrics
337(27)
Swanirbhar Majumder
Saurabh Pal
Chapter 17 Privacy Preserving Text Analytics: Research Challenges and Strategies in Name Analysis
364(22)
Suresh Velum
Yogachandran Rahulamathavan
B. B. Gupta
Muttukrishnan Rajarajan
Chapter 18 Intrusion Detection and Prevention on Flow of Big Data Using Bacterial Foraging
386(26)
Khaleel Ahmad
Gaurav Kumar
Abdul Wahid
Mudasir M. Kirmani
Chapter 19 An Outline of Threats and Sensor Cloud Infrastructure in Wireless Sensor Network
412(21)
Bhavana Butani
Piyush Kumar Shukla
Sanjay Silakari
Chapter 20 An Evolutionary Approach for Load Balancing in Cloud Computing
433(31)
Subashis Mohapatra
Chapter 21 A Practical Approach on Virtual Machine Live Migration
464(20)
Prashanta Kumar Das
Compilation of References 484(33)
About the Contributors 517(10)
Index 527
Ganesh Chandra Deka, Ministry of Labour and Employment, India.

Sambit Bakshi, National Institute of Technology Rourkela, India.