Big data and cloud identity service for mobile authentication

Big data and cloud identity service for mobile authentication

For access to this article, please select a purchase option:

Buy chapter PDF
(plus tax if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Your details
Why are you recommending this title?
Select reason:
Mobile Biometrics — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

Increased individual mobility has pushed the modern society needs for a reliable individual identity verification system as a critical component in many transactions in commercial industries, public sectors and government domains. The requirement for an ideal human identity verification is critical to security and prevention of identity fraud. Thus, trusted identity management has become an essential part of contemporary system infrastructure. It is now well accepted that biometrics-the science of identifying a person (or verifying their identity) based on their physiological or behavioral characteristics-can provide significant value when building such systems. Three key cornerstones in a trusted biometrics-based identity system include the following: (a) A trusted identity enrollment process (b) A trusted identity verification process (c) An identity credential management mechanism. In this chapter, we present several emerging developments in mobile biometrics technologies with particular focus on futuristic cognitive authentication systems for enabling large-scale trusted identity management systems based on biometrics and also biometrics identity services in the cloud. Biometrics is excellent mechanisms for the authentication or identification of individuals because of the credential's uniqueness and persistence almost over the lifetime of the person. Biometric identity services in the cloud enable mobile biometrics wide adoption economically and also take advantages of adjacent technology advancements.

Chapter Contents:

  • 17.1 Introduction
  • 17.1.1 Identity establishment and management
  • 17.1.2 Mega trend impacts
  • 17.1.3 Large-scale biometric applications and big data
  • 17.1.4 Cloud computing
  • 17.2 Characteristics of mobile biometrics
  • 17.2.1 Mobile biometric concepts
  • 17.2.2 Mobile biometric data
  • 17.2.3 Biometric processes and performance metrics
  • 17.3 Smart mobile devices
  • 17.3.1 Many mobile sensors available
  • 17.3.2 Multibiometrics fusion
  • 17.4 Emerging mobile biometrics techniques
  • 17.4.1 Traditional biometrics - fingerprint, face, and iris
  • 17.4.2 Behavior biometrics
  • 17.4.3 Risk-based continuous authentication and trust management
  • 17.5 Conceptual mobile application architecture
  • 17.6 Biometric identity services in the cloud
  • 17.6.1 Biometrics-enabled identity services
  • 17.6.2 Biometric identity service cloud model
  • 17.6.3 How to develop a biometrics-identity-service-cloud model?
  • 17.7 Cognitive authentication system: a point of view
  • 17.8 Conclusions
  • References

Inspec keywords: mobile computing; trusted computing; biometrics (access control); cloud computing; authorisation; Big Data

Other keywords: identity credential management mechanism; trusted identity enrollment process; identity fraud prevention; individual identity verification system; mobile biometrics technologies; cloud identity service; trusted identity management; mobile authentication; trusted identity verification process; cognitive authentication systems; Big data; individual mobility

Subjects: Data security; Ubiquitous and pervasive computing; Internet software

Preview this chapter:
Zoom in

Big data and cloud identity service for mobile authentication, Page 1 of 2

| /docserver/preview/fulltext/books/sc/pbse003e/PBSE003E_ch17-1.gif /docserver/preview/fulltext/books/sc/pbse003e/PBSE003E_ch17-2.gif

Related content

This is a required field
Please enter a valid email address