Secure fingerprint authentication system on an untrusted computing environment

被引:0
|
作者
Chung, Y [1 ]
Moon, D
Kim, T
Pan, S
机构
[1] Korea Univ, Dept Comp & Informat Sci, Seoul, South Korea
[2] ETRI, Biometr Technol Res Team, Taejon, South Korea
[3] Chosun Univ, Div Informat & Control Measurement Engn, Kwangju, South Korea
来源
TRUST, PRIVACY, AND SECURITY IN DIGITAL BUSINESS | 2005年 / 3592卷
关键词
biometrics; fingerprint verification; untrusted clients; embedded sensors;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we propose a secure and scalable solution for user authentication by using fingerprint verification on the sensor-client-server model, even with the client that is not necessarily trusted by the sensor holder or the server. In a typical implementation of fingerprint verification on the sensor-client-server model, the most time consuming step of the fingerprint verification, i.e., feature extraction, is assigned to a client because of real-time, scalability, and privacy issues. Compared to either a sensor or a server, however, the client connected to an open network and maintained by an individual user may be more vulnerable to Trojan Horse attacks. To protect Trojan Horse attacks launched at the untrusted client, our protocol has the fingerprint sensor to validate the result computed by the client for the feature extraction. However, the validation should be simple so that the resource-constrained fingerprint sensor can validate it in real-time. To solve this problem, we separate the feature extraction into binarization and minutiae extraction, and assign the time-consuming binarization to the client. After receiving the result of binarization from the client, the sensor conducts a simple validation algorithm to check the result, and then performs minutiae extraction and sends the extracted minutiae to the server. Based on the experimental results, the proposed solution for fingerprint verification can be performed on the sensor-client-server model securely, scalablely, and in real-time with the aid of an untrusted client.
引用
收藏
页码:299 / 310
页数:12
相关论文
共 50 条
  • [1] A Secure IoT-Based Authentication System in Cloud Computing Environment
    Wu, Hsiao-Ling
    Chang, Chin-Chen
    Zheng, Yao-Zhu
    Chen, Long-Sheng
    Chen, Chih-Cheng
    SENSORS, 2020, 20 (19) : 1 - 14
  • [2] Energy Conserving Secure VM Allocation in Untrusted Cloud Computing Environment
    Sharma, Swati
    Kaushal, Rishabh
    COMPUTE'17: PROCEEDINGS OF THE 10TH ANNUAL ACM INDIA COMPUTE CONFERENCE, 2017, : 73 - 81
  • [3] Secure and Efficient Online Fingerprint Authentication Scheme Based On Cloud Computing
    Liu, Yao
    Zhou, Tanping
    Yue, Zelun
    Liu, Wenchao
    Han, Yiliang
    Li, Qi
    Yang, Xiaoyuan
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (01) : 564 - 578
  • [4] A new secure authentication scheme for cloud computing environment
    Namasudra, Suyel
    Roy, Pinki
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (20):
  • [5] A Secure Mutual authentication approach to fog computing environment
    Kalaria, Rudri
    Kayes, A. S. M.
    Rahayu, Wenny
    Pardede, Eric
    COMPUTERS & SECURITY, 2021, 111
  • [6] Energy-Optimized Secure Remote Fingerprint Authentication in a Mobile Environment
    Hong, Seungwoo
    Lee, Sungju
    Chung, Yongwha
    Kim, Hakil
    Pan, Sungbum
    2010 DIGEST OF TECHNICAL PAPERS INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS ICCE, 2010,
  • [7] Homomorphic Authentication for Computing Securely on Untrusted Machines
    Fiore, Dario
    SECURE IT SYSTEMS, NORDSEC 2017, 2017, 10674 : XI - XIII
  • [8] Using a Network of Untrusted Computers for Secure Computing
    Maly, Michal
    PROCEEDINGS OF THE SEVENTH INTERNATIONAL CONFERENCE ON AUTONOMIC AND AUTONOMOUS SYSTEMS (ICAS 2011), 2011, : 57 - 61
  • [9] Secure Fingerprint Authentication with Homomorphic Encryption
    Yang, Wencheng
    Wang, Song
    Yu, Kan
    Kang, James Jin
    Johnstone, Michael N.
    2020 DIGITAL IMAGE COMPUTING: TECHNIQUES AND APPLICATIONS (DICTA), 2020,
  • [10] A Secure User Authentication Protocol Based on ECC for Cloud Computing Environment
    Diksha Rangwani
    Hari Om
    Arabian Journal for Science and Engineering, 2021, 46 : 3865 - 3888