Analyzing the security susceptibilities of biometrics integrated with cloud computing

John R. Regola, John K. Mitchell, Brandon R. Baez, Syed S. Rizvi

Research output: Chapter in Book/Report/Conference proceedingChapter


In the present scenario, the vulnerabilities associated with cloud computing and biometric technology rank among the most vital issues in information security. In this chapter, the primary goal is to investigate the physical and informational security susceptibilities of biometrics, analyze the structure and design possibilities of the cloud, and examine the new developments of biometrics with cloud computing. Foremost, the authors analyze the developments of biometrics and compare the performance based on defining characteristics. In addition, they examine threats and attacks that can compromise the assets of an organization or an individual's sensitive information. Furthermore, this chapter provides a comprehensive discussion on the physical vulnerabilities of biometrics. Moreover, one section of this chapter focuses on the informational and database vulnerabilities. In this chapter, the authors also discuss the design considerations and cloud computing paradigm in relation to biometric security systems.

Original languageEnglish (US)
Title of host publicationHandbook of Research on Securing Cloud-Based Databases with Biometric Applications
PublisherIGI Global
Number of pages17
ISBN (Electronic)9781466665606
ISBN (Print)1466665599, 9781466665590
StatePublished - Oct 31 2014

All Science Journal Classification (ASJC) codes

  • General Computer Science


Dive into the research topics of 'Analyzing the security susceptibilities of biometrics integrated with cloud computing'. Together they form a unique fingerprint.

Cite this