Secure Authentication Using Biometric Templates in Kerberos

被引:0
|
作者
Maheshwari, Radhika [1 ]
Gupta, Apoorva [1 ]
Chandra, Nidhi [1 ]
机构
[1] Amity Univ, Amity Sch Engn & Technol, Noida, India
关键词
Biometric templates; distributed system; Data Security; Hadoop; Kerberos; master slave architecture;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The paper suggests the use of biometric templates for achieving the authentication in distributed systems and networks using Kerberos. The most important advantage in using the biometric templates is implying biologically inspired passwords such as pupil, fingerprints, face, iris, hand geometry, voice, palm print, handwritten signatures and gait. Using biometric templates in Kerberos gives more reliability to client server architectures for analysis in distributed platform while dealing with sensitive and confidential information. Even today the companies face challenge of security of confidential data. Although the main focus of the development of hadoop, CDBMS like technologies was primarily oriented towards the big data analysis, data management and further conversion of huge chunks of raw data into useful information. Hence, implementing biometric templates in Kerberos makes various frameworks on master slave architecture to be more reliable providing an added security advantage.
引用
收藏
页码:1247 / 1250
页数:4
相关论文
共 50 条
  • [1] Secure speech biometric templates for user authentication
    Inthavisas, K.
    Lopresti, D.
    [J]. IET BIOMETRICS, 2012, 1 (01) : 46 - 54
  • [2] Biometric-Kerberos Authentication Scheme for Secure Mobile Computing Services
    Han, Fengling
    Alkhathami, Mohammed
    Van Schyndel, Ron
    [J]. 2013 6TH INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING (CISP), VOLS 1-3, 2013, : 1694 - 1698
  • [3] Secure Authentication Using Biometric Methods
    Rejman-Greene, Marek
    [J]. Information Security Technical Report, 2002, 7 (03): : 30 - 40
  • [4] Protecting Biometric Templates Using Authentication Watermarking
    Li, ChunLei
    Ma, Bin
    Wang, Yunhong
    Zhang, Zhaoxiang
    [J]. ADVANCES IN MULTIMEDIA INFORMATION PROCESSING-PCM 2010, PT I, 2010, 6297 : 709 - 718
  • [5] Secure remote authentication using biometric data
    Boyen, X
    Dodis, Y
    Katz, J
    Ostrovsky, R
    Smith, A
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS, 2005, 3494 : 147 - 163
  • [6] A Secure Hiding Scheme for Tamper-Proofing and Authentication of Color Biometric Templates
    Ben Tarif, Eyad
    Wibowo, Santoso
    Wasimi, Saleh
    Tareef, Afaf
    Tareaf, Abedalraheem
    [J]. 2017 8TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION SYSTEMS (ICICS), 2017, : 141 - 146
  • [7] A New Pre-authentication Protocol in Kerberos 5: Biometric Authentication
    Hoa Quoc Le
    Hung Phuoc Truong
    Hoang Thien Van
    Thai Hoang Le
    [J]. 2015 IEEE RIVF INTERNATIONAL CONFERENCE ON COMPUTING & COMMUNICATION TECHNOLOGIES - RESEARCH, INNOVATION, AND VISION FOR THE FUTURE (RIVF), 2015, : 157 - 162
  • [8] Secure sketch for biometric templates
    Li, Qiming
    Sutcu, Yagiz
    Memon, Nasir
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2006, 2006, 4284 : 99 - +
  • [9] One Time Biometric Transform to Secure Biometric Templates
    Abhyankar, Aditya
    Kulkarni, Shailesh
    Talware, Rajendra
    Schuckers, Stephanie
    [J]. 2010 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND AUTOMATION ENGINEERING (ICCAE 2010), VOL 5, 2010, : 881 - 885
  • [10] Electrocardiogram-Kerberos Authentication Scheme for Secure Services
    Prakasha, Krishna
    Muniyal, Balachandra
    Kavyashree
    Deeksha
    [J]. 2016 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT), VOL 3, 2015, : 91 - 94