Two important topics related to the cloud security are discussed in this chapter: the authentication of logical users accessing the cloud, and the security of data stored on public cloud servers. A real cloud platform is used as example; it is designed and implemented to support basic web applications, and to be shared by small and medium companies. Such platform is built using the OpenStack architecture. The user authentication is based on an original biometric approach exploiting fingerprints and open to multimodal improvements. The platform guarantees secure access of multiple users and complete logical separation of computational and data resources, related to different companies. High level of protection of the data, stored in the clou...
© Springer International Publishing AG 2016. User authentication based on biometrics is getting an i...
Virtualization technology is the base technology used in Cloud computing. Therefore, virtualization ...
Abstract: Clients that utilization distributed computing can browse a scope of offices. It offers se...
Two important topics related to the cloud security are discussed in this chapter: the authentication...
Two important topics related to the cloud security are discussed in this chapter: the authentication...
The study focuses on presenting a review on the various biometric authentication mechanisms in the c...
Security concern has become the biggest obstacle to adoption of cloud because all information and da...
© 2016 IEEE. The adoption of Cloud computing involves many advantages in terms of flexibility, scala...
Abstract: Authenticating the user based on behavior based biometrics is more reliable than the more...
Cloud computing will be a main informationinfrastructure in the future; it consists of many largedat...
Advances in distributed computing and virtualization allowed cloud computing to establish itself as ...
The convenience provided by cloud computing has led to an increasing trend of many business organiza...
Part 3: Biometrics and Biometrics ApplicationsInternational audienceRapid development of smart techn...
Abstract—As the future big data storage center for tenants, cloud computing has been a hot issue rec...
The raise in the recent security incidents of cloud computing and its challenges is to secure the da...
© Springer International Publishing AG 2016. User authentication based on biometrics is getting an i...
Virtualization technology is the base technology used in Cloud computing. Therefore, virtualization ...
Abstract: Clients that utilization distributed computing can browse a scope of offices. It offers se...
Two important topics related to the cloud security are discussed in this chapter: the authentication...
Two important topics related to the cloud security are discussed in this chapter: the authentication...
The study focuses on presenting a review on the various biometric authentication mechanisms in the c...
Security concern has become the biggest obstacle to adoption of cloud because all information and da...
© 2016 IEEE. The adoption of Cloud computing involves many advantages in terms of flexibility, scala...
Abstract: Authenticating the user based on behavior based biometrics is more reliable than the more...
Cloud computing will be a main informationinfrastructure in the future; it consists of many largedat...
Advances in distributed computing and virtualization allowed cloud computing to establish itself as ...
The convenience provided by cloud computing has led to an increasing trend of many business organiza...
Part 3: Biometrics and Biometrics ApplicationsInternational audienceRapid development of smart techn...
Abstract—As the future big data storage center for tenants, cloud computing has been a hot issue rec...
The raise in the recent security incidents of cloud computing and its challenges is to secure the da...
© Springer International Publishing AG 2016. User authentication based on biometrics is getting an i...
Virtualization technology is the base technology used in Cloud computing. Therefore, virtualization ...
Abstract: Clients that utilization distributed computing can browse a scope of offices. It offers se...