Thesis on "Emerging Trends for Cloud Computing Facilitated by Advanced Biometric Technologies for Enhanced Security"

Thesis 7 pages (2873 words) Sources: 9

[EXCERPT] . . . .

Cloud Computing

Emerging Trends for Cloud Computing facilitated by Advanced Biometric Technologies for Enhanced Security

Author (I will fill this part )

Affiliation (I will fill this part )

An organizations' greatest asset is its information and knowledge. The integration and refinement of biometrics technologies into the process workflows of homeland security and defence agencies globally is the objective of this analysis.

Inherent in the development of a biometrics-based access strategy for cloud-based resources is the need for compliance to global standards and U.S. Federal mandates as well. The influence of the Federal Information Processing Standard (FIPS) 199 for information management [7], the Federal Information Processing Systems standard (FIPS200) [7], in addition to the Federal Rules of Evidence and CFR Part 1250 compliance are included in this analysis.

Using cloud computing platforms to more effectively and economically manage and distribute information, government agencies concentrating on homeland security and defence can attain greater agility and effectiveness by using biometrics as their primary technology for authenticating users and safeguarding information assets. Strategies that require intensive collaboration are predicated on having each role within homeland security and defence agency integrate yet secure from the standpoint of access and authentication with biometric-based access technologies and processes.

Ultimately, the objective is to create a role-based cloud architecture that can scale and be agile enough to give homeland security
Continue scrolling to

download full paper
and defence agencies the ability to anticipate and respond to threats while protecting the core information assets effectively through biometric-based technologies and processes.

1. Introduction

Cloud computing and its underlying technologies are redefining the economics, strategies and processes by which organizations use their most critical asset, information. Protecting these critical information assets in homeland security and defence ministries requires exact verification of the identity and role of those using the databases, files, systems and global networks. Authentication based purely on keystrokes or passwords has been shown to be less secure in pervasive cloud-based applications vs. biometrics and more advanced forms of security based on identifying a person through biological and physiological attributes [3]. Engraining biometrics into cloud-based platforms and applications for department of homeland security and defence agencies requires intensive levels of process integration and system development. This analysis presents the overview of cloud computing from the context of the integration points to make biometrics-based security possible.

This analysis focuses on evaluating the benefits, risks, and assessing the strengths, weaknesses, opportunities and threats of using biometric technologies in conjunction with cloud computing platforms in the fields of Homeland Security and Defense industries. More specifically, looking at how to integrate biometrics-based technologies into homeland security and defence industry workflows to ensure greater levels of authentication, identity verification and role-based access across all information assets is the goal of this analysis. In order to accomplish this, comparisons of biometric technologies that are in pilot status or in active use today by governments globally are first discussed in this analysis.

In order to integrate biometrics effectively into these workflows the global and U.S.-specific standards must first be assessed. The rapid pace of technological change is matched by the proliferation of standards globally in biometrics, both from compliance and from security standpoint [3] has led to biometrics being integrated at the application level of databases, security applications and systems. These standards include those from the global computing standards organizations including the World Wide Web Consortium (W3C), the International Electrical Engineering Society (IEEE) and International Standards organization (ISO) 27001 [7]. The latter standard is the most all-encompassing and concentrates on an enterprise-wide control of security strategies. What is significant about these standards is that they have led to the development of an entirely new set of Application Program Interfaces (APIs) for biometrics processes and systems. These APIs are forcing the development of more streamlined, integrated, and Web-based applications that are Web Services-based [10]. The intent of these APIs is to create enough agility for application, database and platform providers to traverse the cloud computing protocol stack or architectural platform as illustrated in Figure 1. Please see Figure 1, Traversing Cloud Computing Architectures using Biometrics APIs for a graphical representation of the cloud computing protocol stack. The speed and accuracy of information workflows that traverse this stack have direct implications on the performance of cloud-based applications globally, across shared databases and security platforms by departments of homeland security and departments or ministries of defence. The greater the level of integration across these systems, the greater the level of security and role-based authentication that can occur over time which makes the development of APIs critically important for biometrics adoption globally.

Specifically the APIs that define how to traverse a cloud-based protocol stack using a J2EE-enabled gateway. This API translates J2EE and AJAX commands into packets for transmission over TCP/IP-based networks. Encrypting these packets for data security is crucial to overall network reliability and security. In addition to these factors, the use of the Java Authentication and Authorization Services (JAAS) protocol to integrate with legacy data via a gateway is used. Arguably APIs are programming constructs, yet their ability to integrate legacy data do make them use cases in complex integration.

These APIs could be harnessed by the application, database and platform providers to traverse the cloud computing protocol stack or architectural platform as illustrated in Figure 1. The speed and accuracy of information workflows that traverse this stack have direct implications on the performance of cloud-based applications globally, across shared databases and security platforms by departments of homeland security and departments or ministries of defence. The greater the level of integration across these systems, the greater the level of security and role-based authentication that can occur over time which makes such development critically important for biometrics adoption globally.

In addition to these industry standards, there are other standards on the use cases of biometrics-based security technologies and their applicability to security strategies and roles [3].

These standards, while U.S.-based, are indicative of the depth of compliance occurring in the use of biometrics and security technology for cloud computing. In conjunction with the APIs and their role in defining platform and protocol stack integration, they have also successfully been used to significantly reduce the training time of new employees developing such security solutions [4]. These standards are also acting as a catalyst for greater inter-process and inter-system integration across the many applications, systems and varying legacy security platforms that departments of homeland security and defence ministries rely on [9].

The APIs specifically dedicated to cross-platform integration through the use of a J2EE-based gateway as defined to traverse the cloud computing architecture rely on a reduced instruction set of routines that are specifically designed to allow for more efficient processing. The reliance on J2EE-based programming standard specifically has been adhered to for their development [6]. The API set has also specifically been designed to allow for auditability and compliance to the following standards for biometrics security and encryption: the Federal Information Processing Standard (FIPS) 199 for information management [7], the Federal Information Processing Systems standard (FIPS200) [7], Federal Rules of Evidence and CFR Part 1250 compliance [7] [3].

The Federal Information Processing Systems standard (FIPS200) ) [7] specifically covers the areas of access control, audit and accountability, awareness and training, certification, accreditation, and security assessments, Configuration management, Contingency planning, identification and authentication, and incident response. In addition, this standard also specifically defines aspects of maintenance, media protection, personnel security, physical and environmental protection and planning risk assessment. The two remaining areas of systems and services acquisition System and communications protection are also defined as part of the standard. Taken together these areas form a strategic security plan for defence and homeland security departments.

Cloud Computing and Biometrics

Cloud computing has emerged as a force in computing as a result of the integration of virtualization technologies [8] and the development of application platforms that can scale elastically across the resource needs of organizations [5]. This has also contributed to the portability of applications to the cloud with APIs that can scale throughout the Cloud computing protocol stack [5]. The rapid maturation of the cloud computing platform is also revolutionizing the economics of enterprise software as well, shifting the balance of purchasing power. No longer are software purchasing decisions made by the Chief Technology officer (CTO); the line-of-business managers and leaders in private industry often purchase cloud-based applications and expense them, creating a challenge for CIOs and their IT staffs who need to integrate the systems and applications together in an organization to maximize their effectiveness and secure the organizations' assets [8]. The need for having encrypted APIs at the system and machine level is critical, as are the requirements of more effective approaches to integrating which specific type of biometrics device is chosen [9].

APIs that provide organizations wide latitude of freedom in choosing which type of biometrics device they choose to implement are driving biometrics adoption. This freedom of defining configurations for biometrics access devices increases the number of pilot projects and testing of biometric-based access control for cloud platform globally [2] [9]. In addition, this… READ MORE

Quoted Instructions for "Emerging Trends for Cloud Computing Facilitated by Advanced Biometric Technologies for Enhanced Security" Assignment:

Short synopisis: Although Cloud Computing is fast growing and remains to be a mystery and there are oblivious gaps amongst professionals trying to probe and understand the scope, feasibility and implementation procedures for Cloud Computing, it is vital to note that securing and managing cloud computing especially with the use of latest state-of-the-art technologies and security measures with the use and adoption of advanced biometric technologies is *****"Key*****" to its success. The article will delve upon the Key Benefits, Top Risks, Strengths, Weakness, Opportunities and Threats in the adoption of such emerging trends for Cloud Computing with the use of Advanced Biometric Technologies in the fields of Homeland Security & Defence markets.

The Article and Writings should cover the following:-

Advanced Persistent Threat and Cloud Security

Building Confidence in the Cloud

Securing the Cloud

Data security in the Cloud

Cloud Computing Security ***** The Soft Spot

Iris Technology and the Cloud

Fingerprint technology enhancing Cloud Security

Other forms of Biometric Technologies such as Facial/Vein/Palm.Retina/Iris/Fingerprint and Multi-Biometrics related to enhancing security for Cloud Computing.

Article should cover:

*****¢ Specifications and applications of Infocomm standards relating to Information Technology Technical Committees/Working Groups

*****¢ Other emerging and/or international standards

*****¢ De-facto standards from standards consortiums or bodies (e.g. W3C, OASIS, IEEE, OMG, etc.)

*****¢ And any technologies relating to the above

Kindly refer to the attached file for additional guidelines and instructions.

The written article is required in MS-WORD File Format by Friday, 23rd July 2010.

How to Reference "Emerging Trends for Cloud Computing Facilitated by Advanced Biometric Technologies for Enhanced Security" Thesis in a Bibliography

Emerging Trends for Cloud Computing Facilitated by Advanced Biometric Technologies for Enhanced Security.” A1-TermPaper.com, 2010, https://www.a1-termpaper.com/topics/essay/cloud-computing-emerging-trends/3993627. Accessed 5 Jul 2024.

Emerging Trends for Cloud Computing Facilitated by Advanced Biometric Technologies for Enhanced Security (2010). Retrieved from https://www.a1-termpaper.com/topics/essay/cloud-computing-emerging-trends/3993627
A1-TermPaper.com. (2010). Emerging Trends for Cloud Computing Facilitated by Advanced Biometric Technologies for Enhanced Security. [online] Available at: https://www.a1-termpaper.com/topics/essay/cloud-computing-emerging-trends/3993627 [Accessed 5 Jul, 2024].
”Emerging Trends for Cloud Computing Facilitated by Advanced Biometric Technologies for Enhanced Security” 2010. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/cloud-computing-emerging-trends/3993627.
”Emerging Trends for Cloud Computing Facilitated by Advanced Biometric Technologies for Enhanced Security” A1-TermPaper.com, Last modified 2024. https://www.a1-termpaper.com/topics/essay/cloud-computing-emerging-trends/3993627.
[1] ”Emerging Trends for Cloud Computing Facilitated by Advanced Biometric Technologies for Enhanced Security”, A1-TermPaper.com, 2010. [Online]. Available: https://www.a1-termpaper.com/topics/essay/cloud-computing-emerging-trends/3993627. [Accessed: 5-Jul-2024].
1. Emerging Trends for Cloud Computing Facilitated by Advanced Biometric Technologies for Enhanced Security [Internet]. A1-TermPaper.com. 2010 [cited 5 July 2024]. Available from: https://www.a1-termpaper.com/topics/essay/cloud-computing-emerging-trends/3993627
1. Emerging Trends for Cloud Computing Facilitated by Advanced Biometric Technologies for Enhanced Security. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/cloud-computing-emerging-trends/3993627. Published 2010. Accessed July 5, 2024.

Related Thesis Papers:

Cloud Computing Several Organizations Research Paper

Paper Icon

Additionally, rampant misuse of cloud resources occurs due to technological vulnerability which spammers exploit by disclosing sensitive information greatly undermining data integrity. However, it is hypothesized that most users are… read more

Research Paper 8 pages (2396 words) Sources: 8 Style: APA Topic: Computers / IT / Internet


Cloud Computing and the Insider Threats' Problems Literature Review

Paper Icon

Cloud Computing and the Insider Threats' Problems

The adoption of cloud computing by several organizations in the recent past has led to a significant paradigm shift as far as information… read more

Literature Review 5 pages (1595 words) Sources: 5 Topic: Management / Organizations


Cloud Computing and Data Security Term Paper

Paper Icon

Cloud Computing and Data Security

Cloud computing service providers have made their systems so inexpensive to use and easy to access, that there is little reason that companies should not… read more

Term Paper 18 pages (5196 words) Sources: 15 Topic: Computers / IT / Internet


Security Issues of Cloud Computing Data Analysis Chapter

Paper Icon

Security Issues in Cloud Computing

The name Cloud computing was coined from the drawings oftentimes employed to illustrate the internet. Cloud computing is an innovative consumption and new delivery approach… read more

Data Analysis Chapter 5 pages (1450 words) Sources: 5 Topic: Computers / IT / Internet


Cloud Computing Term Paper

Paper Icon

Cloud computing is a term for a model of network computing that is convenient, on-demand, and allows a shared pool of computing resources that are configurable to the user's needs.… read more

Term Paper 11 pages (2980 words) Sources: 11 Topic: Computers / IT / Internet


Fri, Jul 5, 2024

If you don't see the paper you need, we will write it for you!

Established in 1995
900,000 Orders Finished
100% Guaranteed Work
300 Words Per Page
Simple Ordering
100% Private & Secure

We can write a new, 100% unique paper!

Search Papers

Navigation

Do NOT follow this link or you will be banned from the site!