scholarly journals Strategies for Exploiting Independent Cloud Implementations of Biometric Experts in Multibiometric Scenarios

2014 ◽  
Vol 2014 ◽  
pp. 1-15 ◽  
Author(s):  
P. Peer ◽  
Ž. Emeršič ◽  
J. Bule ◽  
J. Žganec-Gros ◽  
V. Štruc

Cloud computing represents one of the fastest growing areas of technology and offers a new computing model for various applications and services. This model is particularly interesting for the area of biometric recognition, where scalability, processing power, and storage requirements are becoming a bigger and bigger issue with each new generation of recognition technology. Next to the availability of computing resources, another important aspect of cloud computing with respect to biometrics is accessibility. Since biometric cloud services are easily accessible, it is possible to combine different existing implementations and design new multibiometric services that next to almost unlimited resources also offer superior recognition performance and, consequently, ensure improved security to its client applications. Unfortunately, the literature on the best strategies of how to combine existing implementations of cloud-based biometric experts into a multibiometric service is virtually nonexistent. In this paper, we try to close this gap and evaluate different strategies for combining existing biometric experts into a multibiometric cloud service. We analyze the (fusion) strategies from different perspectives such as performance gains, training complexity, or resource consumption and present results and findings important to software developers and other researchers working in the areas of biometrics and cloud computing. The analysis is conducted based on two biometric cloud services, which are also presented in the paper.

Author(s):  
Siddhartha Duggirala

The essence of cloud computing is moving out the processing from the local systems to remote systems. Cloud is an umbrella of physical/virtual services/resources easily accessible over the internet. With more companies adopting cloud either fully through public cloud or hybrid model, the challenges in maintaining a cloud capable infrastructure is also increasing. About 42% of CTOs say that security is their main concern for moving into cloud. Another problem, which is mainly problem with infrastructure, is the connectivity issue. The datacenter could be considered as the backbone of cloud computing architecture. Handling this new generation of requirements of volume, variety, and velocity in IoT data requires us to evaluate the tools and technologies. As the processing power and storage capabilities of the end devices like mobile phones, routers, sensor hubs improve, we can increase leverage these resources to improve your quality and reliability of services. Applications of fog computing is as diverse as IoT and cloud computing itself. What IoT and fog computing have in common is to monitor and analyse real-time data from network connected things and acting on them. Machine-to-machine coordination or human-machine interaction can be a part of this action. This chapter explores fog computing and virtualization.


2018 ◽  
Vol 7 (2.20) ◽  
pp. 150
Author(s):  
L Archana ◽  
K P. K. Devan ◽  
P Harikumar

Cloud Computing has already grabbed its roots in many industries. It has become a fascinating choice for small budget organizations, as On-demand resources are available on pay as you use basis. However, security of data being stored at cloud servers is still a big question for organizations in today’s digital era where information is money. Large organizations are reluctant to switch to cloud services since they have threat of their data being manipulated. Cloud service provider’s claim of providing robust security mechanism being maintained by third party, but still there are many reported incidents of security breach in cloud environment in past few years. Thus, there is need for ro-bust security mechanism to be adopted by cloud service providers in order for excelling cloud computing. Since there are n number of data’s in cloud, Storage of those data are to be placed with high rank of Significance. In Existing system, no efficient hybrid algorithms are used there by security and storage is compromised to significant ratio. We propose AES and Fully Homomorphic algorithm to encrypt the data, thereby file size get is compressed thereby increasing Data security and stack pile.  


Author(s):  
Olexander Melnikov ◽  
◽  
Konstantin Petrov ◽  
Igor Kobzev ◽  
Viktor Kosenko ◽  
...  

The article considers the development and implementation of cloud services in the work of government agencies. The classification of the choice of cloud service providers is offered, which can serve as a basis for decision making. The basics of cloud computing technology are analyzed. The COVID-19 pandemic has identified the benefits of cloud services in remote work Government agencies at all levels need to move to cloud infrastructure. Analyze the prospects of cloud computing in Ukraine as the basis of e-governance in development. This is necessary for the rapid provision of quality services, flexible, large-scale and economical technological base. The transfer of electronic information interaction in the cloud makes it possible to attract a wide range of users with relatively low material costs. Automation of processes and their transfer to the cloud environment make it possible to speed up the process of providing services, as well as provide citizens with minimal time to obtain certain information. The article also lists the risks that exist in the transition to cloud services and the shortcomings that may arise in the process of using them.


Author(s):  
Вячеслав Вікторович Фролов

The article is devoted to the analysis of modern approaches that ensure the security of cloud services. Since cloud computing is one of the fastest growing areas among information technology, it is extremely important to ensure the safety and reliability of processes occurring in the clouds and to secure the interaction between the client and the provider of cloud services. Given that fears about data loss and their compromise are one of the main reasons that some companies do not transfer their calculations to the clouds. The object of research and analysis of this work are cloud services, which are provided by various cloud service providers. The aim of the study of this work is to compare existing approaches that provide information security for cloud services, as well as offer a new approach based on the principle of diversity. There are many approaches that ensure their safety, using both traditional and cloud-specific. The multi-cloud approach is one of the most promising strategies for improving reliability by reserving cloud resources on the servers of various cloud service providers. It is shown that it is necessary to use diversity to ensure the reliability and safety of critical system components. The principle of diversity is to use a unique version of each resource thanks to a special combination of a cloud computing provider, the geographical location of data centers, cloud service presentation models, and cloud infrastructure deployment models. The differences between cloud providers and which combination of services are preferable to others in terms of productivity are discussed in detail. In addition, best practices for securing cloud resources are reviewed. As a result, this paper concludes that there is a problem of insufficient security and reliability of cloud computing and how to reduce threats in order to avoid a common cause failure and, as a result, loss of confidential data or system downtime using diversity of cloud services.


Author(s):  
Claudio Estevez

Cloud computing is consistently proving to be the dominant architecture of the future, and mobile technology is the catalyst. By having the processing power and storage remotely accessible, the main focus of the terminal is now related to connectivity and user-interface. The success of cloud-based applications greatly depends on the throughput experienced by the end user, which is why transport protocols play a key role in mobile cloud computing. This chapter discusses the main issues encountered in cloud networks that affect connection-oriented transport protocols. These issues include, but are not limited to, large delay connections, bandwidth variations, power consumption, and high segment loss rates. To reduce these adverse effects, a set of proposed solutions are presented; furthermore, the advantages and disadvantages are discussed. Finally, suggestions are made for future mobile cloud computing transport-layer designs that address different aspects of the network, such as transparency, congestion-intensity estimation, and quality-of-service integration.


Author(s):  
Siddhartha Duggirala

The essence of Cloud computing is moving out the processing from the local systems to remote systems. Cloud is an umbrella of physical/virtual services/resources easily accessible over the internet. With more companies adopting cloud either fully through public cloud or Hybrid model, the challenges in maintaining a cloud capable infrastructure is also increasing. About 42% of CTOs say that security is their main concern for moving into cloud. Another problem which is mainly problem with infrastructure is the connectivity issue. The datacenter could be considered as the backbone of cloud computing architecture. As the processing power and storage capabilities of the end devices like mobile phones, routers, sensor hubs improve we can increasing leverage these resources to improve your quality and reliability of services.


Author(s):  
Saravanan K ◽  
P. Srinivasan

Cloud IoT has evolved from the convergence of Cloud computing with Internet of Things (IoT). The networked devices in the IoT world grow exponentially in the distributed computing paradigm and thus require the power of the Cloud to access and share computing and storage for these devices. Cloud offers scalable on-demand services to the IoT devices for effective communication and knowledge sharing. It alleviates the computational load of IoT, which makes the devices smarter. This chapter explores the different IoT services offered by the Cloud as well as application domains that are benefited by the Cloud IoT. The challenges on offloading the IoT computation into the Cloud are also discussed.


Fog Computing ◽  
2018 ◽  
pp. 208-219
Author(s):  
Siddhartha Duggirala

The essence of Cloud computing is moving out the processing from the local systems to remote systems. Cloud is an umbrella of physical/virtual services/resources easily accessible over the internet. With more companies adopting cloud either fully through public cloud or Hybrid model, the challenges in maintaining a cloud capable infrastructure is also increasing. About 42% of CTOs say that security is their main concern for moving into cloud. Another problem which is mainly problem with infrastructure is the connectivity issue. The datacenter could be considered as the backbone of cloud computing architecture. As the processing power and storage capabilities of the end devices like mobile phones, routers, sensor hubs improve we can increasing leverage these resources to improve your quality and reliability of services.


2018 ◽  
pp. 54-76
Author(s):  
Tabassum N. Mujawar ◽  
Ashok V. Sutagundar ◽  
Lata L. Ragha

Cloud computing is recently emerging technology, which provides a way to access computing resources over Internet on demand and pay per use basis. Cloud computing is a paradigm that enable access to shared pool of resources efficiently, which are managed by third party cloud service providers. Despite of various advantages of cloud computing security is the biggest threat. This chapter describes various security concerns in cloud computing. The clouds are subject to traditional data confidentiality, integrity, availability and various privacy issues. This chapter comprises various security issues at different levels in environment that includes infrastructure level security, data level and storage security. It also deals with the concept of Identity and Access Control mechanism.


Author(s):  
Ajai K. Daniel

The cloud-based computing paradigm helps organizations grow exponentially through means of employing an efficient resource management under the budgetary constraints. As an emerging field, cloud computing has a concept of amalgamation of database techniques, programming, network, and internet. The revolutionary advantages over conventional data computing, storage, and retrieval infrastructures result in an increase in the number of organizational services. Cloud services are feasible in all aspects such as cost, operation, infrastructure (software and hardware) and processing. The efficient resource management with cloud computing has great importance of higher scalability, significant energy saving, and cost reduction. Trustworthiness of the provider significantly influences the possible cloud user in his selection of cloud services. This chapter proposes a cloud service selection model (CSSM) for analyzing any cloud service in detail with multidimensional perspectives.


Sign in / Sign up

Export Citation Format

Share Document