Trusted Application Using Biometrics for Android Environment

被引:0
|
作者
Anbalagan, Nandhini [1 ]
Helmi, Rabab Alayham Abbas [1 ]
Ashour, Marwan Abdul Hameed [2 ]
Jamal, Arshad [1 ]
机构
[1] Management & Sci Univ, Fac Informat Sci & Engn, Shah Alam, Selangor, Malaysia
[2] Univ Baghdad, Coll Adm & Econ, Baghdad, Iraq
关键词
Android; Biometrics; Component; Face recognition; Graphical password; Trusted computing;
D O I
10.1109/cspa48992.2020.9068715
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The age of depending on processing devices has passed, the current life style is more dependent on continuous connectivity to the cyber space. This requires exceeding connectivity being a need to service providers such as businesses and companies to become a need for service consumers to maintain the services. Perhaps one of the most popular tools to achieve this degree of connectivity are mobile devices, with their "anytime, anywhere" characteristics, thus providing connectivity and ensuring mobility. This characteristic comes with inherited risks from both mobility and connectivity. Therefore, efforts have been focused on providing added layers of security for mobile environment, thus causing an additional security measures that subsequently adds more complications to the environment. This research provides a secure mobile environment with a simple nonevasive biometric authentication, represented by face recognition, a backup security layer is provided, represented by a graphical password, if the user fails to unlock with the face recognition feature, the graphical password option can be used. At the same time, if any intruder tries to unlock and fails the third time, the system will capture the face and send it to a pre-defined email automatically; thus the suggested method provides an authentication mechanism that is suitable for daily use, at the same time can serve with high efficiency for users with disability or special needs. The choice of the backup authentication is also designed to take in consideration the needs of such users' categories.
引用
收藏
页码:7 / 12
页数:6
相关论文
共 50 条
  • [1] Securing the manufacturing environment using biometrics
    Modi, SK
    Elliott, SJ
    39TH ANNUAL 2005 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2005, : 275 - 278
  • [2] Accelerated Application Monitoring Environment of Android
    Fukuda, Shoki
    Kurihara, Shun
    Hamanaka, Shintaro
    Oguchi, Masato
    Yamaguchi, Saneyasu
    2016 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS-TAIWAN (ICCE-TW), 2016, : 169 - 170
  • [3] The Trade-Off between Performance and Security of Virtualized Trusted Execution Environment on Android
    Doan T.-P.
    Chau N.-T.
    Park J.
    Jung S.
    Computer Systems Science and Engineering, 2023, 46 (03): : 3059 - 3073
  • [4] Application of Trusted Virtual Environment Module in Cloud Computing
    Hu Yu
    SUSTAINABLE DEVELOPMENT OF NATURAL RESOURCES, PTS 1-3, 2013, 616-618 : 2196 - 2199
  • [5] Android based digital steganography application using LSB and PSNR algorithm in mobile environment
    Shaiden, Affiq Shahmi Mohamad
    Islam, Shayla
    Subaramaniam, Kasthuri
    PROCEEDINGS OF MECHANICAL ENGINEERING RESEARCH DAY 2020 (MERD'20), 2020, : 143 - 144
  • [6] Secured network authentication using biometrics application
    Laili, MHB
    Jamaludin, MZ
    Din, NM
    Said, NHM
    2002 STUDENT CONFERENCE ON RESEARCH AND DEVELOPMENT, PROCEEDINGS: GLOBALIZING RESEARCH AND DEVELOPMENT IN ELECTRICAL AND ELECTRONICS ENGINEERING, 2002, : 368 - 370
  • [7] Cloud Key Management using Trusted Execution Environment
    Bouamama, Jaouhara
    Hedabou, Mustapha
    Erradi, Mohammed
    SECRYPT 2021: PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2021, : 560 - 567
  • [8] Transforming byzantine faults using a trusted execution environment
    Madsen, Mads Frederik
    Gaub, Mikkel
    Kirkbro, Malthe Ettrup
    Debois, Soren
    2019 15TH EUROPEAN DEPENDABLE COMPUTING CONFERENCE (EDCC 2019), 2019, : 63 - 70
  • [9] DroidVault: A Trusted Data Vault for Android Devices
    Li, Xiaolei
    Hu, Hong
    Bai, Guangdong
    Jia, Yaoqi
    Liang, Zhenkai
    Saxena, Prateek
    2014 19TH INTERNATIONAL CONFERENCE ON ENGINEERING OF COMPLEX COMPUTER SYSTEMS (ICECCS 2014), 2014, : 29 - 38
  • [10] A Behavioral Biometrics User Authentication Study Using Motion Data from Android Smartphones
    Maghsoudi, Javid
    Tappert, Charles C.
    2016 EUROPEAN INTELLIGENCE AND SECURITY INFORMATICS CONFERENCE (EISIC), 2016, : 184 - 187