Security and Cryptographic Challenges for Authentication Based on Biometrics Data

被引:12
|
作者
Nita, Stefania Loredana [1 ]
Mihailescu, Marius Iulian [2 ]
Pau, Valentin Corneliu [3 ]
机构
[1] Univ Bucharest, Dept Comp Sci, Bucharest 030018, Romania
[2] Royal Caribbean, Dept Data Syst, Miami, FL 33132 USA
[3] Acad Romanian Scientists, Bucharest 050094, Romania
关键词
machine learning; chaos-based cryptography; Hadoop; data clustering; biometrics;
D O I
10.3390/cryptography2040039
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authentication systems based on biometrics characteristics and data represents one of the most important trend in the evolution of the society, e.g., Smart City, Internet-of-Things (IoT), Cloud Computing, Big Data. In the near future, biometrics systems will be everywhere in the society, such as government, education, smart cities, banks etc. Due to its uniqueness, characteristic, biometrics systems will become more and more vulnerable, privacy being one of the most important challenges. The classic cryptographic primitives are not sufficient to assure a strong level of secureness for privacy. The current paper has several objectives. The main objective consists in creating a framework based on cryptographic modules which can be applied in systems with biometric authentication methods. The technologies used in creating the framework are: C#, Java, C++, Python, and Haskell. The wide range of technologies for developing the algorithms give the readers the possibility and not only, to choose the proper modules for their own research or business direction. The cryptographic modules contain algorithms based on machine learning and modern cryptographic algorithms: AES (Advanced Encryption System), SHA-256, RC4, RC5, RC6, MARS, BLOWFISH, TWOFISH, THREEFISH, RSA (Rivest-Shamir-Adleman), Elliptic Curve, and Diffie Hellman. As methods for implementing with success the cryptographic modules, we will propose a methodology which can be used as a how-to guide. The article will focus only on the first category, machine learning, and data clustering, algorithms with applicability in the cloud computing environment. For tests we have used a virtual machine (Virtual Box) with Apache Hadoop and a Biometric Analysis Tool. The weakness of the algorithms and methods implemented within the framework will be evaluated and presented in order for the reader to acknowledge the latest status of the security analysis and the vulnerabilities founded in the mentioned algorithms. Another important result of the authors consists in creating a scheme for biometric enrollment (in Results). The purpose of the scheme is to give a big overview on how to use it, step by step, in real life, and how to use the algorithms. In the end, as a conclusion, the current work paper gives a comprehensive background on the most important and challenging aspects on how to design and implement an authentication system based on biometrics characteristics.
引用
收藏
页码:1 / 22
页数:22
相关论文
共 50 条
  • [41] Biometrics Authentication Based on Chaotic Heartbeat waveform
    Nomura, Ryoko
    Ishikawa, Yu
    Umeda, Tomohiro
    Takata, Masami
    Kamo, Hiroyasu
    Joe, Kazuki
    [J]. 2014 7TH BIOMEDICAL ENGINEERING INTERNATIONAL CONFERENCE (BMEICON), 2014,
  • [42] Keypress Interval Timing Ratios as Behavioral Biometrics for Authentication in Computer Security
    Giroux, Shallen
    Wachowiak-Smolikova, Renata
    Wachowiak, Mark P.
    [J]. NDT: 2009 FIRST INTERNATIONAL CONFERENCE ON NETWORKED DIGITAL TECHNOLOGIES, 2009, : 195 - 200
  • [43] A Novel Approach for Enhancing the Security of User Authentication in VANET Using Biometrics
    Remyakrishnan, P.
    Tripti, C.
    [J]. EMERGING ICT FOR BRIDGING THE FUTURE, VOL 2, 2015, 338 : 299 - 306
  • [44] On the security of Yoon and Yoo's biometrics remote user authentication scheme
    [J]. Liu, Ming, 1600, World Scientific and Engineering Academy and Society, Ag. Ioannou Theologou 17-23, Zographou, Athens, 15773, Greece (11):
  • [45] New approach for user authentication based on biometrics
    Zhu, Ming
    Zhou, Jin
    Wang, Jikang
    [J]. Jisuanji Gongcheng/Computer Engineering, 2002, 28 (10):
  • [46] BIOMETRICS IN CLAIM-BASED AUTHENTICATION FRAMEWORK
    Ignatenko, Tanya
    [J]. 2015 IEEE 16TH INTERNATIONAL WORKSHOP ON SIGNAL PROCESSING ADVANCES IN WIRELESS COMMUNICATIONS (SPAWC), 2015, : 385 - 389
  • [47] Survey on VANET security challenges and possible cryptographic solutions
    Mejri, Mohamed Nidhal
    Ben-Othman, Jalel
    Hamdi, Mohamed
    [J]. VEHICULAR COMMUNICATIONS, 2014, 1 (02) : 53 - 66
  • [48] Non-Cryptographic Security to Data: Distortion based Anonymization Techniques
    Banu, K. Sharmila
    Santhi, V.
    Tripathy, B. K.
    [J]. 2014 INTERNATIONAL CONFERENCE ON ADVANCES IN ENGINEERING AND TECHNOLOGY (ICAET), 2014,
  • [49] A Graphic-based Cryptographic Model for Authentication
    Alese, Boniface K.
    Akindele, Abimbola
    Dahunsi, Folasade M.
    Thompson, Aderonke F.
    Adesuyi, Tosin
    [J]. 2017 INTERNATIONAL CONFERENCE ON CYBER SITUATIONAL AWARENESS, DATA ANALYTICS AND ASSESSMENT (CYBER SA), 2017,
  • [50] Multi-Biometrics Based Cryptographic Key Regeneration Scheme
    Kanade, Sanjay
    Petrovska-Delacretaz, Dijana
    Dorizzi, Bernadette
    [J]. 2009 IEEE 3RD INTERNATIONAL CONFERENCE ON BIOMETRICS: THEORY, APPLICATIONS AND SYSTEMS, 2009, : 333 - 339