Two important topics related to the cloud security are discussed in this chapter: the authentication of logical users accessing the cloud, and the security of data stored on public cloud servers. A real cloud platform is used as example; it is designed and implemented to support basic web applications, and to be shared by small and medium companies. Such platform is built using the OpenStack architecture. The user authentication is based on an original biometric approach exploiting fingerprints and open to multimodal improvements. The platform guarantees secure access of multiple users and complete logical separation of computational and data resources, related to different companies. High level of protection of the data, stored in the cloud, is ensured by adopting a peculiar data fragmentation approach.

Biometric Authentication and Data Security in Cloud Computing / Masala, Giovanni L.; Ruiu, Pietro; Grosso, Enrico - In: Computer and Network Security Essentials[s.l] : Springer International Publishing, 2017. - ISBN 978-3-319-58424-9. - pp. 337-353 [10.1007/978-3-319-58424-9_19]

Biometric Authentication and Data Security in Cloud Computing

RUIU, PIETRO;
2017

Abstract

Two important topics related to the cloud security are discussed in this chapter: the authentication of logical users accessing the cloud, and the security of data stored on public cloud servers. A real cloud platform is used as example; it is designed and implemented to support basic web applications, and to be shared by small and medium companies. Such platform is built using the OpenStack architecture. The user authentication is based on an original biometric approach exploiting fingerprints and open to multimodal improvements. The platform guarantees secure access of multiple users and complete logical separation of computational and data resources, related to different companies. High level of protection of the data, stored in the cloud, is ensured by adopting a peculiar data fragmentation approach.
2017
978-3-319-58424-9
Computer and Network Security Essentials
File in questo prodotto:
Non ci sono file associati a questo prodotto.
Pubblicazioni consigliate

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11583/2679552
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo