In addition to the stability, scalability and extensibility of its architecture, cloud platform have made it possible for workflows across government to become more pervasive and secure as a result . The TCO of a given cloud platform or series of applications therefore has continued to become reduced by the experience effect (comparable to economies of scale yet only applied to data aggregated and knowledge creation) across government . This experience effect is being driven by the pervasive piloting of APIs and the development of shared resource programs that enable greater accuracy and speed of response to share security threats across departments of homeland security, departments, and ministries of defence globally .
The flexibility and agility of APIs are also the catalyst for Infrastructure-as-a-Service (IaaS) secured platforms that are biometrics device agnostic. That is to say they rely only on the API-based interface to the device, not the actual commands to operate them. This has drastically reduced the cost and time-to-value for biometrics systems globally, and has reduced TCO drastically as well.
The Biometrics APIs that hold together the Cloud Computing Infrastructure shown in Figure 1 also have specific implications on the Platform-as-a-Service (PaaS) layer of the model as well, as this layer deals with integration to legacy systems .
Being able to connect with and use the various legacy systems through biometrics-driven APis and peripheral devices can drastically reduce the threat of a system being hacked or compromised .
This area middle layer of the Cloud Computing Infrastructure is the most vulnerable due to the proliferation of standards, both from industry organizations including W3C and IEEE, and the many government standards continue to focus on this most vulnerable aspect of deployment cloud computing technologies  .
Standards including ISO/IEC 19784-1, ISO/IEC 24708, and ISO 27001 programming standards that homeland security and defence departments must adhere to mitigate risks of security breaches at this level of the could computing infrastructure model .
All of these factors have been included in a series of API requirements that enable integration of each layer of the Cloud Computing Infrastructure . This is particularly relevant in the PaaS layer of the cloud-computing infrastructure, where security to the API level needs to be achieved while at the same time delivering pervasive support for the burgeoning number of biometric systems  in development and use today to support role-based access of sensitive data . Integrating the biometrics API into the PaaS layer is also critically important for supporting identity verification and authorization technologies including iris scans, facial recognition, palm and retina scanning, in fingerprint identification and analysis which vary across devices in terms of their implementation and device-level support . Homeland security and defence organizations choosing to deploy a range of technologies face the daunting task of ensuring integration to identification databases on the one hand and to the actual scanning device on the other are secured and cannot be compromised . For many homeland security and defence organizations however, the reliance on role-based access across their organization has become a requirement . Role-based authentication necessitates the use of multiple identification technologies, each requiring integration to a tertiary and often legacy databases, while also requiring integration to the actual device through APIs. The PaaS layer is then by default the weakest link in the security strategy of any cloud computing infrastructure.
Figure 1. Traversing Cloud Computing Architectures using Biometrics APIs
Evaluating Role-based Biometric Use in Cloud Computing Environments
3.1 Biometric Characteristics
Superior to authentication through credentials or licenses, biometric-based authentication share a common trait of being able to identify a person by their behavioural and physiological attributes . Biometric technologies can thus be used to define group-based permissions based on roles that are cross-referenced by physiological attributes . This leads to availability of security protocols for homeland security and defence organizations, where entire groups can be defined for access to specific areas, for example in a branch of the military needing access to a supply chain centre . All biometric technologies share the attributes of universality, uniqueness, permanence, and collectability...
All four of these criteria must be met for a biometrics system to be effectively used for monitoring, granting or refusing access to assets, both information and location-based . From a SaaS standpoint, the integration of various biometrics technologies must be in compliance to industry and government requirements  if the databases accessed at the IaaS layer of the cloud computing infrastructure model are to remain secure. The most challenging aspect of biometric implementation through SaaS however is securing the queries to the authentication, biometrics, and identity management databases integrated at the IaaS layer of the cloud infrastructure . Please see Table 4.1, Comparing Biometric Technologies. There is a correlation between cost and susceptibility, as the higher the cost to implement the less the susceptibility of the technology to circumvention . To compensate for this fact, system use requirements are critical for the secure use of biometrics in homeland security and defence applications. The next section discusses these system use requirements.
3.2 System Use Requirements for Role-based Biometrics
Simply put role-based biometrics are the collection of strategies and initiatives for getting the best possible information and systems to those in need of it, by role and responsibility level throughout defence and homeland security agencies. Role-based biometrics break down tasks into processes so that information can be delivered to the right person and the right time to make the best possible decision.
Search criteria that can be stored and used as the basis of linguistic modelling and latent semantic indexing (LSI) of content to increase search performance. The use of biometrics APIs for search has been piloted  and continues to be developed that includes LSI-based technologies. The secured search platform requirements are defined to streamline access to the Cloud Computing Infrastructure without compromising all system integration points and connections.
Authentication through multiple biometric-based APIs for biometric technologies and secured integration points at the IaaS level .
Support for search and user taxonomy and ontological development to increase system performance, augment learning of homeland security, and defence requirements over time .
Creation of role-based logins and support for analytics to evaluate overall system and search match performance over time are essential components in the overall development of these biometrics-based systems using the common set of APIs .
Creation of secured search engine functionality that is both textual and graphical in nature through secured biometrics API connections .
4.1 Comparison of Biometric Technologies
The following table analyses biometric technologies and evaluates them on a series of criteria including accuracy, ease of use, and susceptibility.
Table 4.1: Comparing Biometric Technologies
Sources: based on analysis of the following   
The emergence of cloud computing platforms and infrastructures has significant implications for security for both defence and homeland security departments and ministries globally. Standards and APIs that have been mentioned in this analysis are applicable across all departments and nations implementing biometrics through the use of the cloud platform. The development of and continual refinement to biometrics-based software applications is also changing how defence and homeland security departments manage their organizations. Role-based access to biometrics-based data changes the overall efficiency and focus of defence and homeland security departments, as it provides the right information at the right time to the groups and individuals who need to use it the most to accomplish their objectives.
Bayly, D., M. Castro, A. Arakala, J. Jeffers, and K. Horadam. "Fractional biometrics: safeguarding privacy in biometric applications. " International Journal of Information Security 9.1 (2010): 69.
Sereguei Boukhonine, Vlad Krotov, and Barry Rupert. "Future Security Approaches and Biometrics. " Communications of the Association for Information Systems 16.(2005): 1.
Katzan, H.. "On The Privacy Of Cloud Computing. " International Journal of Management and Information Systems 14.2 (2010): 1-12.
Louridas, P.. "Up in the Air: Moving Your Applications to the Cloud. " IEEE Software 27.4 (2010): 6
Owens, D.. "Securing Elasticity in the Cloud. " Association for Computing Machinery. Communications of the ACM 53.6 (2010): 46.…
Cloud Computer and Insider Threats Cloud computing is widely regarded as the wave of the future. "Cloud computing is all the rage. It's become the phrase du jour" (Knorr & Gruen 2011). However, many people throw the phrase around without truly understanding what it really is. "Cloud computing comes into focus only when you think about what IT always needs: a way to increase capacity or add capabilities on the fly
This approach to defining a performance-based taxonomy will also allow for a more effective comparison within industries as well. All of these factors taken together will provide enterprise computing buyers with more effective foundations of arguing for more thorough measures of application performance. The net result will be much greater visibility into how cloud computing is actually changing the global economics of the enterprise computing industry. III. Final Report: Introduction The foundational
Cloud Computing Research Question and Experimental Design Develop a research question that addresses one of the unknowns you identified in Part I of the literature review and sketch a quantitative or qualitative study that can answer the question about what is unknown and contribute to theory. Draw on the additional resources for this course for guidance in understanding the concepts (e.g., internal validity, threats to validity, and operationalization) needed to address
Service Oriented Architecture As technology and computers evolve, new and better ways of managing these components becomes necessary. The concept of Service Oriented Architecture (SOA) has arisen as new model or method in which engineers, managers and everyday people can maximize their technologies in new and better ways. By understanding and embracing transformation within this area of technology, new paradigms of learning can be achieved and the collective ideals that are
Cloud Computing as an emerging technology. I have discussed its uses in today's world along with the future impacts it might have on an individual or on the businesses. I have also included how its rapid growth can bring about major changes in the world. The term cloud computing can be described as "a pool of virtualized computing resources that allows users to gain access to applications and data in
adopting the use of cloud-based technologies in the last five years. This trend has caused a significant shift in the way that many organizations interact with information both internally and externally. Yet there are also many risk factors inherent in these technologies, some of which are the result of insider conspiracy (Brender & Markov, 2013). Cloud computing offers many advantages over traditional IT infrastructure which make it an attractive option,