• Home
  • About
  • My Account
  • Blog
  • Success Stories
  • Contact
Bayometric Bayometric Bayometric Bayometric
  • Live Scan
    • Print to FD-258 Card – Background Check
    • SWFT Applicant System
    • FBI Fingerprinting – Live Scan
    • NFA Fingerprinting – Live Scan
    • FINRA EFS
    • FDLE Live Scan
    • Fingerprint Background Check
    • SWFT+ Compatible Devices
  • Fingerprint SDK
    • Touch N Go
    • Griaule Fingerprint SDK
  • Single Sign-On
  • Fingerprint Scanner
    • USB Scanners
      • SecuGen Hamster Pro
      • SecuGen Hamster Plus (HSDU03P)
      • Nitgen Fingkey Hamster DX
      • Lumidigm M301 (M30x)
      • Lumidigm M311 (M31x)
      • Lumidigm V302 (V30x)
      • Lumidigm V311 (V31x)
      • Nitgen Fingkey Hamster II
      • Nitgen Fingkey Hamster III
      • Verifi P5100
      • IB Curve
    • FBI Certified Readers
      • SecuGen Hamster Pro 10
      • SecuGen Hamster Pro 20 (HU20)
      • SecuGen Hamster IV (HSDU04P)
      • Unity 20 Bluetooth
      • Integrated Biometrics Watson Mini
      • Integrated Biometrics Columbo
      • Suprema BioMini Plus 2
      • Suprema RealScan-G1
      • Suprema BioMini Slim 2
      • Suprema BioMini Slim 2S
    • Ten Print Scanners
      • Integrated Biometrics Kojak
      • Suprema RealScan G10
      • Integrated Biometrics FIVE-0
    • Dual / Two Print Scanners
      • Suprema RealScan-D
      • Integrated Biometrics Sherlock
      • Integrated Biometrics Watson Mini
      • Nitgen eNBioScan-D Plus
    • Scanners + Card Readers
      • SecuGen iD-Serial
      • SecuGen iD-USB SC/PIV
      • SecuGen ID USB SC
      • Hamster Pro Duo CL
      • Hamster Pro Duo SC/PIV
      • Suprema BioMini Combo
    • OEM Modules
      • SecuGen SDU03P
      • SecuGen SDU04P
      • Lumidigm M300 (M30x)
      • Lumidigm M310 (M31x)
      • Lumidigm V300 (V30x)
      • Lumidigm V310 (V31x)
  • NFA Fingerprinting
Bayometric Bayometric
  • Live Scan
    • Print to FD-258 Card – Background Check
    • SWFT Applicant System
    • FBI Fingerprinting – Live Scan
    • NFA Fingerprinting – Live Scan
    • FINRA EFS
    • FDLE Live Scan
    • Fingerprint Background Check
    • SWFT+ Compatible Devices
  • Fingerprint SDK
    • Touch N Go
    • Griaule Fingerprint SDK
  • Single Sign-On
  • Fingerprint Scanner
    • USB Scanners
      • SecuGen Hamster Pro
      • SecuGen Hamster Plus (HSDU03P)
      • Nitgen Fingkey Hamster DX
      • Lumidigm M301 (M30x)
      • Lumidigm M311 (M31x)
      • Lumidigm V302 (V30x)
      • Lumidigm V311 (V31x)
      • Nitgen Fingkey Hamster II
      • Nitgen Fingkey Hamster III
      • Verifi P5100
      • IB Curve
    • FBI Certified Readers
      • SecuGen Hamster Pro 10
      • SecuGen Hamster Pro 20 (HU20)
      • SecuGen Hamster IV (HSDU04P)
      • Unity 20 Bluetooth
      • Integrated Biometrics Watson Mini
      • Integrated Biometrics Columbo
      • Suprema BioMini Plus 2
      • Suprema RealScan-G1
      • Suprema BioMini Slim 2
      • Suprema BioMini Slim 2S
    • Ten Print Scanners
      • Integrated Biometrics Kojak
      • Suprema RealScan G10
      • Integrated Biometrics FIVE-0
    • Dual / Two Print Scanners
      • Suprema RealScan-D
      • Integrated Biometrics Sherlock
      • Integrated Biometrics Watson Mini
      • Nitgen eNBioScan-D Plus
    • Scanners + Card Readers
      • SecuGen iD-Serial
      • SecuGen iD-USB SC/PIV
      • SecuGen ID USB SC
      • Hamster Pro Duo CL
      • Hamster Pro Duo SC/PIV
      • Suprema BioMini Combo
    • OEM Modules
      • SecuGen SDU03P
      • SecuGen SDU04P
      • Lumidigm M300 (M30x)
      • Lumidigm M310 (M31x)
      • Lumidigm V300 (V30x)
      • Lumidigm V310 (V31x)
  • NFA Fingerprinting
Nov 23

Biometrics to Secure Cloud Communication and Applications

  • Danny Thakkar
  • Biometric Security, Cloud Communication

Introduction

Organizations implementing cloud solutions have gained many benefits over the past several years. Cloud solutions provide several advantages such as mobility, flexibility and costs savings. Therefore, it is expected that the number of cloud users will grow rapidly in the next few years. Cloud computing allows dynamically scalable online resources to be provisioned over the internet cheaply as a service. Along with the many benefits that cloud computing offers the security challenges that it poses are equally striking. The two fundamental functions for secure cloud management are identity management and access control.

Cloud-based SolutionsPhoto: Cloud computing

In cloud computing, the current approaches for user authentication are based on credentials that are submitted by the user. These credentials include passwords, tokens and digital certificates. However, these credentials are not completely secure and can unfortunately be stolen, accidentally revealed or just hard to remember. In view of the above, a biometric-based authentication protocol is best suited for the cloud environment to implement user authentication schemes. Moreover, the non-denial requirements of remote user authentication approach imply that it can be efficiently achieved using a biometrics-based method. One of the most popular and effective biometric approaches is fingerprint authentication scheme.

What are the security issues in cloud computing?

The most important benefit of mobile cloud computing is the capability to access data and applications at any time and from anywhere effortlessly and cost-effectively. Cloud computing is an emerging technology where users can access services based on their requirements without getting into the intricacies of knowing how the services are delivered or where they are hosted. The cloud environment is based on abstracting and providing various resources like computing power, network, storage and software remotely as services on the internet.

Current internet authentication approaches for most cases imply a username and password combination. But the biggest problem with this approach is that the existence of too many password account pairings for every individual user leads to either forgotten passwords or using the same combination for multiple sites. Protecting the remote data and applications from any illegitimate access still remains a primary security concern in mobile cloud computing. The main issue is along with the authorized users, the cloud provider can also access the data. The possibility of unauthorized access by third parties such as hackers also exists. Security issue is therefore a major area of research in mobile cloud computing.

Security Breaches and Hacker AttacksPhoto: Security breaches and hacker attacks

Vulnerability of web applications to security breaches and hacker attacks is a huge concern as these applications involve both and enterprise and private customer information. For any web application development, protecting such assets is an important priority. The protection mechanism can involve various steps such as authentication and authorization, asset handling, activity logging and auditing. Though traditional mechanisms such as password management or encryption can be used to take care of this purpose, their effectiveness cannot be guaranteed.

Thus we see that although the adoption of cloud computing provides a lot of advantages in terms of flexibility, scalability and reliability; it also brings many new security challenges such as protection and privacy of personal data. Moreover, protection mechanisms such as encryption may not be suitable for mobile cloud computing users as encryption technology is a high workload process and requires high CPU processing power. Also, mobile devices have hardware limitations and may not be able to install and run applications that require extensive CPU processing and large memory. Therefore, the use of fingerprint recognition to authenticate mobile cloud computing not only protects the mobile cloud from unauthorized users but also improves the overall security.

How does biometric technology work with cloud applications?

The implementation of biometric technology to cloud signifies that the cloud services can be utilized through a web-based interface. This interface can either be a web browser or a mobile application. The basic layout of any biometric identification system remains same irrespective of the modality that is used.

Biometrics in the CloudImage: Cloud-based biometrics (devtechnology.com)

This approach involves moving both the biometric database and the software part to the cloud. This will ensure appropriate technology scalability and sufficient amounts of storage. Moreover, a cloud based system has several other aspects such as real-time and parallel processing capabilities that make it further appealing. The widespread availability of mobile devices makes it accessible for many applications and services that rely on mobile clients. The existing generation of biometric systems offers many new possibilities for cloud computing security. Adopting biometrics in cloud computing and applications will help clients to ensure information security as well as provide a cost-effective security solution for the service providers.

The deployment of biometric technology to cloud computing offers many attractive possibilities that include smart spaces, access control applications, ambient intelligence environments etc. Mobile cloud-based biometrics is an emerging market trend fueled by factors such as flexibility and enhanced cost savings. This further adds to the number of mobile cloud users which is growing rapidly. A Bloomberg survey reveals that cloud computing is expected to earn around $ 270 billion in 2020.

How can fingerprint authentication be utilized to secure cloud computing applications?

The diagram shown below explains an authentication mechanism that uses fingerprint recognition to secure mobile cloud access and applications.

This authentication approach utilizes the camera of mobile phone to capture fingerprint images. The idea is to convert the fingertip image obtained by the mobile phone camera to a fingerprint image and extract the ridge structure from it to make it as similar as possible to the image obtained from a fingerprint sensor. Every time the user wants to access the cloud, he simply scans his fingerprint and logs in. The whole approach is hosted on cloud to derive maximum benefit as all processes and storage are there.

Fingerprint Authentication Mechanism in the CloudFigure: Fingerprint recognition to secure mobile cloud access and applications.

Initially, the user presents his fingertip to the sensor that captures the image and this is known as the enrollment phase. The fingerprint sample is pre-processed to obtain the extracted features and stored in a database which will later be used for comparison to verify the identity of the user. When a user wants to login to access applications on cloud, he provides his fingerprint to the sensor which captures the image and performs some pre-processing function to extract the features. Then a matching function performs a comparison between these extracted features and the features that were stored in the database during the enrollment phase. If the matching is successful, the user is accepted otherwise rejected.

The comparison between the extracted features and the features stored in the database results in a similarity score (S). It is explained below.

If S has a low value, it implies there is little similarity.

If S has a high value, it implies there is high similarity.

This similarity score (S) is then compared to a predefined threshold (T) based on which the final decision will be made.

If (S>T) then
The user is accepted
Else if (S<T) then
The user is rejected.

What are the advantages of implementing biometrics to cloud computing?

Biometrics infrastructure can be very quickly set up literally within a matter of few minutes. Biometric services can be provided as an on-demand service where it is possible to add or cancel components almost instantaneously. It is an affordable technology especially for the small and medium-sized businesses. Unlike traditional authentication systems, the costs involved in a biometric cloud-based infrastructure is mostly fixed. For example, password based systems require maintenance costs for resetting of forgotten or lost passwords.

It is highly scalable which implies that a biometric application can be cut back or expanded in just a matter of few minutes. The available resource pooling enables biometric databases to be scaled and can fit any array of applications ranging from a simple 1:1 to the most complex 1: N verification scenarios.

Conclusion

We have discussed in this article how biometric technology can be applied to cloud communication and applications to combat the security risks such as hacked passwords and data intrusion. The advantages that biometrics provides to cloud computing makes it a viable and positive solution for all entities involved in the process. The greatest advantage of implementing biometrics in cloud is that enterprise grade biometric based systems can now be made available for all kinds and types of businesses, not just a select few. It is expected that with the passage of time the application of biometric technology to cloud computing will be more widely accepted and rapidly implemented on a larger scale.

  • Facebook
  • Twitter
  • Reddit
  • Pinterest
  • Google+
  • LinkedIn
  • E-Mail

About The Author

Mary Clark is Product Manager at Bayometric, one of the leading biometric solution providers in the world. She has been in the Biometric Industry for 10+ years and has extensive experience across public and private sector verticals.

Comments are closed.

Have any questions? We will be happy to answer.

Sidebar Contact

Shop online for high quality fingerprint readers

Hamster Pro 20

hamster pro 20
Buy Online

Unity 20 Bluetooth

unity 20 bluetooth
Buy Online

Hamster Plus

hamster plus
Buy Online

Columbo

columbo
Buy Online

Fingerprint applications we offer

Fingerprint SDK

Simple and Intuitive API, NO biometrics programming experience required. Get sample code in C++, C#, VB, Java etc.
Take a Tour

Live Scan

Live scan fingerprinting allows quick and cost effective background checks of individuals.
Take a Tour

Computer Logon

Logon to Windows, Domain, Websites and Applications using fingerprints & create a ”password free” environment.
Take a Tour

Search the Blog

Categories

  • Access Control
  • Archive
  • Automotive Biometrics
  • Background Check
  • Big Data
  • Biometric ATMs
  • Biometric Authentication
  • Biometric Data Security
  • Biometric Device
  • Biometric Identification
  • Biometric Immigration
  • Biometric National ID
  • Biometric News
  • Biometric Passport
  • Biometric Payment
  • Biometric Research
  • Biometric Screening
  • Biometric Security
  • Biometric Spoofing
  • Biometric System
  • Biometric Technology
  • Biometric Terminology
  • Biometrics as a Service
  • Biometrics Comparison
  • Biometrics Examples
  • Biometrics in Banking
  • Biometrics in Education
  • Biometrics in School
  • Border Control
  • BYOD
  • Cloud Communication
  • Cloud-based Biometrics
  • Covid 19
  • Cyber Security
  • Facial Recognition
  • Finger Vein Recognition
  • Fingerprint Attendance
  • Fingerprint Door Lock
  • Fingerprint Recognition
  • Fingerprint Scanner App
  • Fingerprint scanners
  • Fingerprint SDK
  • Fingerprint with Phone
  • Future of Biometrics
  • Guest Blog
  • Hand Geometry
  • Healthcare Biometrics
  • Home Security
  • Hospitality Industry
  • Integration Guideline
  • Internet of Things
  • Iris Recognition
  • Law Enforcement
  • Live Scan Fingerprinting
  • Mass Surveillance
  • Membership Management
  • Multi-factor Authentication
  • Multimodal Biometrics
  • Network Security
  • NFA Fingerprinting
  • Palm Vein Recognition
  • Patient Identification
  • Privacy
  • Public Safety
  • Retail POS
  • Retinal Scan
  • SecuGen RD Service
  • Secure Data Center
  • Signature Verification
  • Single Sign On
  • Smart Card
  • Time and Attendance
  • Two-factor Authentication
  • Vascular Biometrics
  • Visitor Management
  • Voice Authentication
  • Voter Registration
  • Windows Biometrics
  • Workforce Management

About Bayometric

Bayometric is a leading global provider of biometric security systems offering core fingerprint identification solutions. Learn more

Products We Offer

  • Touch N Go
  • Single Sign-On
  • Biometric Access Control
  • Biometric Security Devices
  • Fingerprint Scanners
  • FBI Certified Readers
  • Live Scan Systems
  • OEM Modules

Contact Us

Footer Contact
Sending

Recent from Blog

  • How Does NFA Obtain Your Criminal History Record? February 4, 2023
  • ATF Final Rule (2021R-08F) – Attached Stabilizing Braces January 30, 2023
  • Can Live Scan Detect Masked Fingerprints? January 5, 2023
© 2007 - 2022 by Bayometric | All Rights Reserved.
  • Best Seller
  • Cart
  • Checkout
  • Policies
  • Industries
  • Knowledge Base
  • Sitemap