dc.contributor.author | Tole, Kevin | |
dc.date.accessioned | 2014-10-24T05:20:14Z | |
dc.date.available | 2014-10-24T05:20:14Z | |
dc.date.issued | 2014-01-01 | |
dc.identifier.issn | 2225-0506 | |
dc.identifier.uri | http://hdl.handle.net/1051/10 | |
dc.description | Kevin Tole
School of Engineering and Information Technology, department of computer Science and Technology.
Technical University of Mombasa, PO box 90420-80100.
kevintolesolomon@yahoo.com | en_US |
dc.description.abstract | The study examines the contribution of personal data stored in the cloud may contain account numbers, passwords, notes, and other critical information that could be used and misused by other users. These data can be cached, copied, and archived by Cloud Service Providers (CSPs), often without user’s authorization and control.
The specific objective of this study is to keep data secure by Self destructing data. The study aims at protecting the user data’s privacy to avoid unethical implications. All the data with their copies become destructed or unreadable after a user specified time, without any user intervention. The biometric information is decrypted and the user is subscribed to access the cloud. This de
cides whether the user is approved or denied. Once the user is recognized as an authorized user, the user can view, upload or download the data stored in cloud. Over the next few years the amount of biometric data being at the disposal of various agencies and authentication service providers is expected to grow significantly. Such quantities of data require not only enormous amounts of storage but also security and usability. | en_US |
dc.publisher | Journal of Information Engineering and Applications | en_US |
dc.relation.ispartofseries | ;Vol.4, No.9, 2014 | |
dc.subject | biometric data | en_US |
dc.subject | cloud service providers | en_US |
dc.subject | Authorization | en_US |
dc.title | Cloud Biometric - Ethical implications, authentication, security and usability | en_US |
dc.type | Article | en_US |