Biometric Security In Mobile Cloud Computing

Read Complete Research Material

Biometric Security in Mobile Cloud Computing



Abstract— This Literature Review Survey paper leads to describe the concepts of Biometric Security in Mobile Cloud Computing, and aims at making a contribution in the survey related to this topic. The goal of this Survey is to contribute to the trend of research efforts and the calibration of technical capabilities for the security of Mobile Cloud Computing using behavioral Biometrics. The ultimate objective is to push the technology forward, to measure the state-of-the-art, and find the most favorable algorithmic approaches.

Keywords— biometric solutions, mobile cloud computing, Handwriting recognition systems, Apache Hadoop

I. INTRODUCTION

Mobile devices are no longer used only for the simple purposes an electronic device serves but with the advancements being made in the world of technology, the scope of mobile technology has received a real boost. It has now become more sophisticated and advanced with the enhancements being made in the name of cloud computing. Cloud computing, a hot emerging technology integrated with mobile technology has given birth to mobile cloud computing technology, a new trend. This allows the users to access the computing resources through their portable devices such as tablets or smart phones, anywhere in the world where internet service is available.

Cloud computing is a class of computing which is thought to be like a super computer having the ability to distribute, collect and process information

and data effectively. Mobile applications running over the cloud computing are expected to gain popularity because of the reason that it allows the users and clients to carry out their tasks from anywhere in the world, the only thing they need to have is internet. Although, this is an exceptional advantage mobile cloud computing provides, security still stands as an important matter to be resolved (Senk & Dotzler, 2011).

In mobile cloud computing, data and information storage is performed in a remote 3rd part location which cannot be influenced by the user. Mobile cloud computing technology like others was not exempted from the problems of security. This issue with mobile computing was more emphasized with the revelation of the security errors in SaaS (software-as-a-service) application of Google (Joch, 2009). Most common knowledge based techniques for security; password and PIN (personal identification number) have been found vulnerable to attacks and can without problems be compromised, observed, shared, forgotten or stolen. Therefore, physical protection of data is not possible in the cloud computing scenario because the basic flaws found in these techniques get more exposed in the world of mobile cloud computing. Biometric individual recognition techniques are used to guarantee privacy while accessing the cloud by improving security (Vivaracho & Pascual, 2010).

Biometric technology is a programmed method which makes use of person's behavioral or physiological features. Many mobile applications make use of biometric solutions to provide security to information and data. According to the research findings of the Alhussain et.al (2010), biometric technological solutions offer privacy, availability along with compatibility with mobile a wide range of devices and many other relative ...