You are previewing Handbook of Research on Securing Cloud-Based Databases with Biometric Applications.
O'Reilly logo
Handbook of Research on Securing Cloud-Based Databases with Biometric Applications

Book Description

Cloud technologies have revolutionized the way we store information and perform various computing tasks. With the rise of this new technology, the ability to secure information stored on the cloud becomes a concern. The Handbook of Research on Securing Cloud-Based Databases with Biometric Applications explores the latest innovations in promoting cloud security through human authentication techniques. Exploring methods of access by identification, including the analysis of facial features, fingerprints, DNA, dental characteristics, and voice patterns, this publication is designed especially for IT professionals, academicians, and upper-level students seeking current research surrounding cloud security.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Book Series
    1. Mission
    2. Coverage
  5. Editorial Advisory Board
  6. Preface
    1. REFERENCES
  7. Chapter 1: Biometric Authentication for the Cloud Computing
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. NEED FOR SECURITY IN CLOUD COMPUTING
    4. 3. SECURITY TECHNOLOGY IN THE CLOUD COMPUTING ENVIRONMENT
    5. 4. PROPOSED METHODOLOGY FOR CLOUD SECURITY USING BIOMETRICS
    6. 5. IMPLEMENTATION OF BIOMETRIC SYSTEM FOR CLOUD SECURITY
    7. 6. CONCLUSION AND FUTURE DIRECTION
    8. REFERENCES
    9. KEY TERMS AND DEFINITIONS
  8. Chapter 2: Recent Trends in Cloud Computing Security Issues and Their Mitigation
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. MAJOR FACTORS THAT IMPACT CLOUD SECURITY
    4. 3. SECURITY AS A SERVICE
    5. 4. STEPS TO BE TAKEN FOR BETTER CLOUD SECURITY
    6. 5. CONCLUSION
    7. REFERENCES
    8. ADDITIONAL READING
    9. KEY TERMS AND DEFINITIONS
  9. Chapter 3: Security Architecture for Cloud Computing
    1. ABSTRACT
    2. INTRODUCTION
    3. CLOUD SECURITY THREATS
    4. CLOUD SECURITY ARCHITECTURE PLAN
    5. INFORMATION SECURITY MANAGEMENT SYSTEM IN CLOUD COMPUTING
    6. SECURITY CONSIDERATION FOR VIRTUALIZATION TECHNOLOGY
    7. MONITORING CLOUD SECURITY
    8. SECURITY PARAMETER IN CLOUD SERVICE PROVIDER SELECTION
    9. DISCUSSION
    10. ASPECT OF DNS CACHE IN CLOUD SECURITY
    11. CONCLUSION
    12. REFERENCES
    13. ADDITIONAL READING
    14. KEY TERMS AND DEFINITIONS
  10. Chapter 4: Big Data Computing Strategies
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. CLOUD COMPUTING FOR BIG DATA
    4. 3. ESTABLISHED STRATEGIES TO PROCESS BIG DATA
    5. 4. BIG DATA APPLICATION IN DIFFERENT DOMAIN
    6. CASE STUDY 1
    7. CASE STUDY 2
    8. CASE STUDY 3
    9. 5. BIG DATA BIOMETRICS
    10. 6. BIG DATA ANALYTICS INSIGHT TO VALUE
    11. 7. CONCLUSION
    12. REFERENCES
    13. KEY TERMS AND DEFINITIONS
  11. Chapter 5: Verifiable Response in Heterogeneous Cloud Storage
    1. ABSTRACT
    2. 1. INTRODUCTION TO CLOUD COMPUTING
    3. 2. FILE SYSTEM
    4. 3. KEY-DISTRIBUTION CENTER (KDC)
    5. 4. KERBEROS PROTOCOL
    6. 5. CONCLUSION
    7. REFERENCES
    8. KEY TERMS AND DEFINITIONS
  12. Chapter 6: NoSQL Databases
    1. ABSTRACT
    2. INTRODUCTION
    3. INDUSTRY PRACTICES IN NoSQL DATABASE
    4. NoSQL CAP ANALYSIS
    5. TWO OUT OF THREE DILEMMAS
    6. BASE THEOREM
    7. ACID
    8. NoSQL AND CLOUD COMPUTING
    9. NoSQL AND BIGDATA
    10. NoSQL DATABASE CHALLENGES
    11. CONCLUSION
    12. REFERENCES
    13. KEY TERMS AND DEFINITIONS
  13. Chapter 7: Cloud Database Security Issues and Challenges
    1. ABSTRACT
    2. INTRODUCTION
    3. NoSQL SECURITY THREATS
    4. CASE STUDY
    5. DISCUSSION
    6. CONCLUSION
    7. REFERENCES
    8. ADDITIONAL READING
    9. KEY TERMS AND DEFINITIONS
  14. Chapter 8: BDS
    1. ABSTRACT
    2. INTRODUCTION
    3. PERSISTENT XSS ATTACK
    4. NON-PERSISTENT XSS ATTACK
    5. BACKGROUND AND LITERATURE SURVEY
    6. PROPOSED TECHNIQUE: BROWSER DEPENDENT XSS SANITIZER
    7. RESULT ANALYSIS AND DISCUSSION
    8. CONCLUSION
    9. REFERENCES
    10. ADDITIONAL READING
    11. KEY TERMS AND DEFINITIONS
  15. Chapter 9: Analyzing the Security Susceptibilities of Biometrics Integrated with Cloud Computing
    1. ABSTRACT
    2. INTRODUCTION
    3. DEVELOPMENT OF BIOMETRIC TECHNOLOGY
    4. COMBINING BIOMETRICS AND CLOUD COMPUTING
    5. VULNERABILITIES IN BIOMETRIC SECURITY SYSTEMS
    6. NEW DEVELOPMENTS
    7. CONCLUSION
    8. REFERENCES
    9. ADDITIONAL READING
    10. KEY TERMS AND DEFINITIONS
  16. Chapter 10: Biometric Authentication for Cloud Computing
    1. ABSTRACT
    2. 1. SECURITY ISSUES IN CLOUD COMPUTING
    3. 2. HANDLING LARGE SCALE BIOMETRIC DATA USING CLOUD COMPUTING
    4. 3. REMOTE AUTHENTICATION SCHEMES FOR ENHANCING CLOUD SECURITY
    5. 4. ORGANIZATIONS PROVIDING CLOUD BASED BIOMETRIC SERVICES
    6. 5. ISSUES IN INTEGRATING BIOMETRICS WITH CLOUD PLATFORM
    7. 6. CONCLUSION AND FUTURE SCOPE
    8. REFERENCES
    9. ADDITIONAL READING
    10. KEY TERMS AND DEFINITIONS
  17. Chapter 11: Cloud Security
    1. ABSTRACT
    2. INTRODUCTION
    3. PROBLEM IDENTIFICATION
    4. CLOUD COMPUTING PARADIGM
    5. BIOMETRICS SECURITY ARCHITECTURES
    6. RESEARCH ISSUES
    7. NEW DEVELOPMENT
    8. PERFORMANCE ASSESSMENT
    9. FUTURE DIRECTIONS
    10. CONCLUSION
    11. REFERENCES
    12. KEY TERMS AND DEFINITIONS
  18. Chapter 12: Biometric
    1. ABSTRACT
    2. BIOMETRICS AND ITS WORK PROCESS
    3. WHY BIOMETRIC IS SECURE?
    4. COLLABORATION AND COMBINATION OF CLOUD AND BIOMETRICS
    5. BIOMETRIC AS AN AUTHENTICATION TO CLOUD SECURITY
    6. TONGUE AS BIOMETRIC VISUALIZES
    7. VOICEPRINT BIOMETRIC
    8. BIOMETRIC INFRASTRUCTURE IN CLOUD
    9. CHALLENGES AND OBSTACLE
    10. STANDARDS AND RECOMMENDATIONS
    11. ADVANTAGES AND DISADVANTAGES OF BIOMETRIC IN CLOUD
    12. DEPLOYMENT POSSIBILITIES AND EXISTING SOLUTIONS
    13. CASE STUDIES
    14. CREDIT CARD ENDORSEMENT USING BIOMETRICS IN CLOUD COMPUTING
    15. BIOMETRIC ATTENDANCE MANAGEMENT SYSTEM: IMPLEMENTATION ON CLOUD ENVIRONMENT
    16. CONCLUSION
    17. REFERENCES
    18. ADDITIONAL READING
    19. KEY TERMS AND DEFINITIONS
  19. Chapter 13: Biometrics in Cloud Computing
    1. ABSTRACT
    2. INTRODUCTION
    3. BIOMETRIC SERVICE
    4. BIOMETRIC TECHNIQUES
    5. OPERATION IN BIOMERIC SYSTEM
    6. CLOUD ARCHITECTURE
    7. BIOMETRIC RECOGNITION SYSTEM IN CLOUD
    8. INTEGRATING BIOMETRIC IN CLOUD
    9. CASE STUDY
    10. CONCLUSION
    11. REFERENCES
    12. KEY TERMS AND DEFINITIONS
  20. Chapter 14: Cloud Security Using Face Recognition
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. ISSUES AND CHALLENGES OF CLOUD SECURITY
    4. 3. BIOMETRIC SYSTEM
    5. 4. IMPLEMENTATION OF PROPOSED FACE RECOGNITION SYSTEM FOR CLOUD SECURITY
    6. 5. CONCLUSION
    7. REFERENCES
    8. KEY TERMS AND DEFINITIONS
  21. Chapter 15: Trusted Cloud- and Femtocell-Based Biometric Authentication for Mobile Networks
    1. ABSTRACT
    2. INTRODUCTION
    3. BIOMETRIC AUTHENTICATION IN CLOUD ENVIRONMENT
    4. CONCLUSION
    5. REFERENCES
    6. KEY TERMS AND DEFINITIONS
  22. Chapter 16: ECG-Based Biometrics
    1. ABSTRACT
    2. INTRODUCTION
    3. PREVIOUS WORKS
    4. THE ECG WAVE
    5. BIOMETRICS
    6. ECG BIOMETRIC
    7. FEATURE EXTRACTION FOR ECG BIOMETRIC
    8. ECG BIOMETRIC FOR CLOUD
    9. CONCLUSION
    10. REFERENCES
    11. ADDITIONAL READING
    12. KEY TERMS AND DEFINITIONS
  23. Chapter 17: Privacy Preserving Text Analytics
    1. ABSTRACT
    2. INTRODUCTION
    3. A SURVEY OF TEXT MINING TECHNIQUES
    4. A SURVEY OF PRIVACY PRESERVING DATA MINING
    5. RESEARCH CHALLENGES AND STRATEGIES IN NAME ANALYSIS
    6. CONCLUSION
    7. REFERENCES
    8. ADDITIONAL READING
    9. APPENDIX
  24. Chapter 18: Intrusion Detection and Prevention on Flow of Big Data Using Bacterial Foraging
    1. ABSTRACT
    2. INTRODUCTION
    3. FLOW CHART AND ALGORITHM
    4. CONCLUSION
    5. REFERENCES
    6. KEY TERMS AND DEFINITIONS
  25. Chapter 19: An Outline of Threats and Sensor Cloud Infrastructure in Wireless Sensor Network
    1. ABSTRACT
    2. INTRODUCTION
    3. SENSOR CLOUD INFRASTRUCTURE
    4. LAYERED ARCHITECTURE OF SENSOR CLOUD
    5. USER AND APPLICATION LAYER
    6. SENSOR-CLOUD AND VIRTUALIZATION LAYER
    7. TEMPLATE CREATION AND TANGIBLE SENSOR LAYER
    8. BENEFITS OF SENSOR-CLOUD
    9. DESTRIBUTED DENIAL OF SERVICE ATTACK IN WSN
    10. NODE CAPTURE ATTACK IN WSN
    11. SURVEY OF MODELING OF NODE CAPTURE ATTACK USING DIFFERENT SCHEMES
    12. SURVEY OF DETECTION AND KEY PRE-DISTRIBUTION SCHEMES TO IMPROVE RESILIENCE AGAINST NODE CAPTURE ATTACK
    13. CONCLUSION
    14. REFERENCES
    15. ADDITIONAL READING
    16. KEY TERMS AND DEFINITIONS
  26. Chapter 20: An Evolutionary Approach for Load Balancing in Cloud Computing
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. LITERATURE REVIEW
    4. 3. MOTIVATION
    5. 4. HEURISTICS FOR LOAD BALANCING
    6. 5. SIMULATION AND TEST BED
    7. 6. EVOLUTIONARY APPROACH FOR LOAD BALANCING
    8. 7. PSO ALGORITHM
    9. 8. EVALUATION AND EXPERIMENTAL RESULTS
    10. 9. CONCLUSION AND FUTURE WORK
    11. REFERENCES
    12. ADDITIONAL READING
    13. KEY TERMS AND DEFINITIONS
  27. Chapter 21: A Practical Approach on Virtual Machine Live Migration
    1. ABSTRACT
    2. INTRODUCTION
    3. VIRUAL MACHINE MIGRATION
    4. CONCLUSION
    5. REFERENCES
    6. KEY TERMS AND DEFINITIONS
  28. Compilation of References
  29. About the Contributors
  30. Introduction