Secure Cloud Based Biometric Signatures Utilizing Smart Devices

被引:0
|
作者
Tait, Bobby [1 ]
机构
[1] Univ S Africa, Biometr Secur Res Team Focusing Cloud Secur, Gauteng, South Africa
关键词
Biometrics; cloud security; authentication; hacking; biometric signatures; biometric protocol; AUTHENTICATION;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
On 20 September 2013 Apple released their latest iPhone device, named the iPhone 5s which incorporates a fingerprint based biometric scanner. The inclusion of a biometric scanner was met with a host of criticism from the security and privacy community. It was soon demonstrated that the biometric reader on the new iPhone is just as vulnerable to spoofing attacks as devised by researchers such as Matsumoto et al. Nearly seven months later, Samsung released the Galaxy 5S, which also incorporates a single inline biometric fingerprint scanner. Apart from gaining access to the device, the Samsung device makes it possible for the user to make payments from a linked PayPal account. As was the case with the iPhone 5s, the Samsung galaxy 5S biometric security was subverted a few weeks after its release, by SRLabs using a faux fingerprint. It is widely accepted that making use of biometrics for effective security during the identification and authentication process is not recommended. People leave latent biometric prints of their fingerprints on everything they touch. Biometric technology is vexed with this problem - a biometric characteristic is not essentially covert, as people deposit their biometric characteristics in various ways in the environment they interact with. In research cases as demonstrated using the iPhone 5s, Samsung Galaxy S5 or many biometric scanners, a fake biometric characteristic can be manufactured from latent biometric prints, to fool the biometric security of the system. Indeed, the ability of biometric technology to directly authenticate an individual is highly desired, and convenient, resulting in many companies investigating and incorporating this technology. If a biometric characteristic is presented, with irrefutable confirmation that the biometric characteristic presented has not been spoofed or tampered with in any way, the authentication environment can be convinced that the person himself, is directly authenticated. In the case with a password or token, however, only the presented password or token is authenticated, and not the individual presenting the password or token. Realising the inherent shortcomings but also the opportunities of biometrics, research has been conducted in this field. A Cloud based biometric security protocol for smart devices was developed, corroborating that it is possible to authenticate a person indisputably using cloud technology, biometrics and a smart device such as the iPhone or Galaxy. This paper proposes an approach to allow a person to use a smart device such as the iPhone 5s, or Galaxy S5 for secure biometric authentication over a networked environment. It is illustrated that a smart device can be considered as a "smart token", to address the security concerns associated with biometric technology. The secondary focus of this paper is to prove that a cloud based biometric security protocol can be used for secure biometrically based digital signatures.
引用
收藏
页码:109 / 118
页数:10
相关论文
共 50 条
  • [1] Secure cloud-based biometric authentication utilising smart devices for electronic transactions
    Tait, Bobby L.
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2014, 6 (01) : 52 - 61
  • [2] User biometric information-based secure method for smart devices
    Su, Xin
    Wang, Bingying
    Zhang, Xuewu
    Wang, Yupeng
    Choi, Dongmin
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2018, 30 (03):
  • [3] Usable and Secure Cloud-based Biometric Authentication Solution for IoT Devices
    Vorakulpipat, Chalee
    Takahashi, Takeshi
    Rattanalerdnusorn, Ekkachan
    Thaenkaew, Phithak
    Inoue, Daisuke
    [J]. 2018 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2018, : 279 - 282
  • [4] Secure Biometric-Based Authentication for Cloud Computing
    Wong, Kok-Seng
    Kim, Myung Ho
    [J]. CLOUD COMPUTING AND SERVICES SCIENCE, CLOSER 2012, 2013, 367 : 86 - 101
  • [5] Biometric data on the edge for secure, smart and user tailored access to cloud services
    Barra, Silvio
    Castiglione, Aniello
    Narducci, Fabio
    De Marsico, Maria
    Nappi, Michele
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 101 : 534 - 541
  • [6] Biometric Access for a Secure Smart Robot
    Kumar, Kanv
    Kumar, Kishan
    Nandan, Shyam
    Mishra, Ashutosh
    Mittal, V. K.
    [J]. 2015 INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, COMPUTING AND CONTROL (ISPCC), 2015, : 46 - 50
  • [8] Cloud-based Secure Logger For Medical Devices
    Hung Nguyen
    Acharya, Bipeen
    Ivanov, Radoslav
    Haeberlen, Andreas
    Phan, Linh T. X.
    Sokolsky, Oleg
    Walker, Jesse
    Weimer, James
    Hanson, William
    Lee, Insup
    [J]. 2016 IEEE FIRST INTERNATIONAL CONFERENCE ON CONNECTED HEALTH: APPLICATIONS, SYSTEMS AND ENGINEERING TECHNOLOGIES (CHASE), 2016, : 89 - 94
  • [9] Secure biometric authentication for weak computational devices
    Atallah, MJ
    Frikken, KB
    Goodrich, MT
    Tamassia, R
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2005, 3570 : 357 - 371
  • [10] Cognitive and Biometric Approaches to Secure Service Management in Cloud-Based Technologies
    Ogiela, Marek R.
    Ogiela, Lidia
    [J]. IEEE CLOUD COMPUTING, 2018, 5 (04): : 70 - 76