Handbook of Research on Securing Cloud-Based Databases with Biometric Applications, 1st Edition

  • Ganesh Chandra Deka
  • Published By:
  • ISBN-10: 1466665602
  • ISBN-13: 9781466665606
  • DDC: 005.8
  • Grade Level Range: College Freshman - College Senior
  • 434 Pages | eBook
  • Original Copyright 2015 | Published/Released December 2015
  • This publication's content originally published in print form: 2015

  • Price:  Sign in for price



Cloud technologies have revolutionized the way we store information and perform various computing tasks. With the rise of this new technology, the ability to secure information stored on the cloud becomes a concern. The Handbook of Research on Securing Cloud-Based Databases with Biometric Applications explores the latest innovations in promoting cloud security through human authentication techniques. Exploring methods of access by identification, including the analysis of facial features, fingerprints, DNA, dental characteristics, and voice patterns, this publication is designed especially for IT professionals, academicians, and upper-level students seeking current research surrounding cloud security.

Table of Contents

Front Cover.
Title Page.
Copyright Page.
Advances in Information Security, Privacy, and Ethics(AISPE) Book Series.
Titles in this Series.
Editorial Advisory Board.
List of Contributors.
Table of Contents.
Detailed Table of Contents.
1: Biometric Authentication for the Cloud Computing.
2: Recent Trends in Cloud Computing Security Issues and Their Mitigation.
3: Security Architecture for Cloud Computing.
4: Big Data Computing Strategies.
5: Verifiable Response in Heterogeneous Cloud Storage: An Efficient KDC Scheme.
6: NoSQL Databases.
7: Cloud Database Security Issues and Challenges.
8: BDS: Browser Dependent XSS Sanitizer.
9: Analyzing the Security Susceptibilities of Biometrics Integrated with Cloud Computing.
10: Biometric Authentication for Cloud Computing.
11: Cloud Security: Implementing Biometrics to Help Secure the Cloud.
12: Biometric: Authentication and Service to Cloud.
13: Biometrics in Cloud Computing.
14: Cloud Security Using Face Recognition.
15: Trusted Cloud- and Femtocell-Based Biometric Authentication for Mobile Networks.
16: ECG-Based Biometrics.
17: Privacy Preserving Text Analytics: Research Challenges and Strategies in Name Analysis.
18: Intrusion Detection and Prevention on Flow of Big Data Using Bacterial Foraging.
19: An Outline of Threats and Sensor Cloud Infrastructure in Wireless Sensor Network.
20: An Evolutionary Approach for Load Balancing in Cloud Computing.
21: A Practical Approach on Virtual Machine Live Migration.
Compilation of References.
About the Contributors.