Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Verification Process

Handbook of Research on Security Considerations in Cloud Computing
One to One matching process: Biometrics can also be used to verify a person's identity. For example, one can grant physical access to a secure area in a building by using finger scans or can grant access to a bank account at an ATM by using retinal scan.
Published in Chapter:
Cloud Security Using Ear Biometrics
Santosh Kumar (Indian Institute of Technology, India), Ali Imam Abidi (Indian Institute of Technology, India), and Sanjay Kumar Singh (Indian Institute of Technology, India)
Copyright: © 2015 |Pages: 26
DOI: 10.4018/978-1-4666-8387-7.ch003
Abstract
Cloud computing has created much enthusiasm in the IT world, institutions, business groups and different organizations and provided new techniques to cut down resource costs and increase its better utilization. It is a major challenge for cloud consumers and service providers equally. Establishing one's identity has become complicated in a vastly interconnected cloud computing network. The need of a consistent cloud security technique has increased in the wake of heightened concerns about security. The rapid development in cloud data storage, network computing services, accessing the cloud services from vendors has made cloud open to security threats. In this chapter, we have proposed an approach based on Ear Biometric for cloud security of individual consumers and vendors. This approaches started to get acceptance as a genuine method for determining an individual's identity. This chapter provides with the stepping stone for future researches to unveil how biometrics can change the cloud security scenario as we know it.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Swarm Intelligence for Biometric Feature Optimization
One to One matching process. Biometrics can also be used to verify a person's identity. For example, one can grant physical access to a secure area in a building by using finger scans or can grant access to a bank account at an ATM by using retinal scan.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR