Secure Cloud Based Biometric Signatures Utilizing Smart Devices

被引:0
|
作者
Tait, Bobby [1 ]
机构
[1] Univ S Africa, Biometr Secur Res Team Focusing Cloud Secur, Gauteng, South Africa
关键词
Biometrics; cloud security; authentication; hacking; biometric signatures; biometric protocol; AUTHENTICATION;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
On 20 September 2013 Apple released their latest iPhone device, named the iPhone 5s which incorporates a fingerprint based biometric scanner. The inclusion of a biometric scanner was met with a host of criticism from the security and privacy community. It was soon demonstrated that the biometric reader on the new iPhone is just as vulnerable to spoofing attacks as devised by researchers such as Matsumoto et al. Nearly seven months later, Samsung released the Galaxy 5S, which also incorporates a single inline biometric fingerprint scanner. Apart from gaining access to the device, the Samsung device makes it possible for the user to make payments from a linked PayPal account. As was the case with the iPhone 5s, the Samsung galaxy 5S biometric security was subverted a few weeks after its release, by SRLabs using a faux fingerprint. It is widely accepted that making use of biometrics for effective security during the identification and authentication process is not recommended. People leave latent biometric prints of their fingerprints on everything they touch. Biometric technology is vexed with this problem - a biometric characteristic is not essentially covert, as people deposit their biometric characteristics in various ways in the environment they interact with. In research cases as demonstrated using the iPhone 5s, Samsung Galaxy S5 or many biometric scanners, a fake biometric characteristic can be manufactured from latent biometric prints, to fool the biometric security of the system. Indeed, the ability of biometric technology to directly authenticate an individual is highly desired, and convenient, resulting in many companies investigating and incorporating this technology. If a biometric characteristic is presented, with irrefutable confirmation that the biometric characteristic presented has not been spoofed or tampered with in any way, the authentication environment can be convinced that the person himself, is directly authenticated. In the case with a password or token, however, only the presented password or token is authenticated, and not the individual presenting the password or token. Realising the inherent shortcomings but also the opportunities of biometrics, research has been conducted in this field. A Cloud based biometric security protocol for smart devices was developed, corroborating that it is possible to authenticate a person indisputably using cloud technology, biometrics and a smart device such as the iPhone or Galaxy. This paper proposes an approach to allow a person to use a smart device such as the iPhone 5s, or Galaxy S5 for secure biometric authentication over a networked environment. It is illustrated that a smart device can be considered as a "smart token", to address the security concerns associated with biometric technology. The secondary focus of this paper is to prove that a cloud based biometric security protocol can be used for secure biometrically based digital signatures.
引用
收藏
页码:109 / 118
页数:10
相关论文
共 50 条
  • [41] Provably secure biometric-based user authentication and key agreement scheme in cloud computing
    Wazid, Mohammad
    Das, Ashok Kumar
    Kumari, Saru
    Li, Xiong
    Wu, Fan
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (17) : 4103 - 4119
  • [42] Cloud-based secure telemedicine information system using crypto-biometric techniques
    Mahto D.
    Yadav D.K.
    [J]. EAI Endorsed Transactions on Pervasive Health and Technology, 2020, 5 (20):
  • [43] Fully Featured Secure Biometric Smart Card Device for Fingerprint-based Authentication and Identification
    Beauge, Lionel
    Drygajlo, Andrzej
    [J]. MM&SEC 2010: 2010 ACM SIGMM MULTIMEDIA AND SECURITY WORKSHOP, PROCEEDINGS, 2010, : 181 - 186
  • [44] STRIDE to a Secure Smart Grid in a Hybrid Cloud
    Jelacic, Bojan
    Rosic, Daniela
    Lendak, Imre
    Stanojevic, Marina
    Stoja, Sebastijan
    [J]. COMPUTER SECURITY, 2017, 2018, 10683 : 77 - 90
  • [45] Smart Grid Data Cloud: A Model for Utilizing Cloud Computing in the Smart Grid Domain
    Rusitschka, Sebnem
    Eger, Kolja
    Gerdes, Christoph
    [J]. 2010 IEEE 1ST INTERNATIONAL CONFERENCE ON SMART GRID COMMUNICATIONS (SMARTGRIDCOMM), 2010, : 483 - 488
  • [46] Smart mobile cloud contributing to the use of smart devices
    [J]. Matsunaga, K., 1600, NEC Mediaproducts (07):
  • [47] ChestLive: Fortifying Voice-based Authentication with Chest Motion Biometric on Smart Devices
    Chen, Yanjiao
    Xue, Meng
    Zhang, Jian
    Guan, Qianyun
    Wang, Zhiyuan
    Zhang, Qian
    Wang, Wei
    [J]. PROCEEDINGS OF THE ACM ON INTERACTIVE MOBILE WEARABLE AND UBIQUITOUS TECHNOLOGIES-IMWUT, 2021, 5 (04):
  • [48] Equipping smart devices with public key signatures
    Ding, Xuhua
    Mazzocchi, Daniele
    Tsudik, Gene
    [J]. ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2007, 7 (01)
  • [49] A secure smart-work service model based OpenStack for Cloud computing
    Jin-Mook Kim
    Hwa-Young Jeong
    Ilkwon Cho
    Sun Moo Kang
    Jong Hyuk Park
    [J]. Cluster Computing, 2014, 17 : 691 - 702
  • [50] Secure smart contracts for cloud-based manufacturing using Ethereum blockchain
    Kumar, Ajay
    Abhishek, Kumar
    Nerurkar, Pranav
    Ghalib, Muhammad Rukunuddin
    Shankar, Achyut
    Cheng, Xiaochun
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (04)