Secure fingerprint authentication system on an untrusted computing environment

被引:0
作者
Chung, Y [1 ]
Moon, D
Kim, T
Pan, S
机构
[1] Korea Univ, Dept Comp & Informat Sci, Seoul, South Korea
[2] ETRI, Biometr Technol Res Team, Taejon, South Korea
[3] Chosun Univ, Div Informat & Control Measurement Engn, Kwangju, South Korea
来源
TRUST, PRIVACY, AND SECURITY IN DIGITAL BUSINESS | 2005年 / 3592卷
关键词
biometrics; fingerprint verification; untrusted clients; embedded sensors;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we propose a secure and scalable solution for user authentication by using fingerprint verification on the sensor-client-server model, even with the client that is not necessarily trusted by the sensor holder or the server. In a typical implementation of fingerprint verification on the sensor-client-server model, the most time consuming step of the fingerprint verification, i.e., feature extraction, is assigned to a client because of real-time, scalability, and privacy issues. Compared to either a sensor or a server, however, the client connected to an open network and maintained by an individual user may be more vulnerable to Trojan Horse attacks. To protect Trojan Horse attacks launched at the untrusted client, our protocol has the fingerprint sensor to validate the result computed by the client for the feature extraction. However, the validation should be simple so that the resource-constrained fingerprint sensor can validate it in real-time. To solve this problem, we separate the feature extraction into binarization and minutiae extraction, and assign the time-consuming binarization to the client. After receiving the result of binarization from the client, the sensor conducts a simple validation algorithm to check the result, and then performs minutiae extraction and sends the extracted minutiae to the server. Based on the experimental results, the proposed solution for fingerprint verification can be performed on the sensor-client-server model securely, scalablely, and in real-time with the aid of an untrusted client.
引用
收藏
页码:299 / 310
页数:12
相关论文
共 50 条
[21]   Secure biometrically based authentication protocol for a public network environment [J].
Tait, Bobby ;
von Solms, Basie .
GLOBAL E-SECURITY, PROCEEDINGS, 2008, 12 :239-246
[22]   A secure digital camera based fingerprint verification system [J].
Hiew, Bee Yan ;
Teoh, Andrew Beng Jin ;
Yin, Ooi Shih .
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2010, 21 (03) :219-231
[23]   Design of Multiple Share Creation with Optimal Signcryption based Secure Biometric Authentication System for Cloud Environment [J].
Prabhu D. ;
Vijay Bhanu S. ;
Suthir S. .
International Journal of Computers and Applications, 2022, 44 (11) :1047-1055
[24]   Robust user authentication model for securing electronic healthcare system using fingerprint biometrics [J].
Jahan S. ;
Chowdhury M. ;
Islam R. .
International Journal of Computers and Applications, 2019, 41 (03) :233-242
[25]   A client/server implementation of an encryption system for fingerprint user authentication [J].
Pujol, Francisco A. ;
Mora, Higinio ;
Luis Sanchez, Jose ;
Jimeno, Antonio .
KYBERNETES, 2008, 37 (08) :1111-1119
[26]   Fingerprint-based identity authentication and digital media protection in network environment [J].
Tian, Jie ;
Li, Liang ;
Yang, Xin .
JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2006, 21 (05) :861-870
[27]   Fingerprint-Based Identity Authentication and Digital Media Protection in Network Environment [J].
Jie Tian ;
Liang Li ;
Xin Yang .
Journal of Computer Science and Technology, 2006, 21 :861-870
[28]   Secure Fingerprint-based authentication and non-repudiation services for mobile learning systems [J].
Foudil, Belhadj ;
Samy, Ait Aoudia ;
Samir, Akrouf .
PROCEEDINGS OF 2015 INTERNATIONAL CONFERENCE ON INTERACTIVE MOBILE COMMUNICATION TECHNOLOGIES AND LEARNING (IMCL), 2015, :200-204
[29]   Fully Featured Secure Biometric Smart Card Device for Fingerprint-based Authentication and Identification [J].
Beauge, Lionel ;
Drygajlo, Andrzej .
MM&SEC 2010: 2010 ACM SIGMM MULTIMEDIA AND SECURITY WORKSHOP, PROCEEDINGS, 2010, :181-186
[30]   Design of secure key management and user authentication scheme for fog computing services [J].
Wazid, Mohammad ;
Das, Ashok Kumar ;
Kumar, Neeraj ;
Vasilakos, Athanasios V. .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 91 (475-492) :475-492