Secure fingerprint authentication system on an untrusted computing environment

被引:0
|
作者
Chung, Y [1 ]
Moon, D
Kim, T
Pan, S
机构
[1] Korea Univ, Dept Comp & Informat Sci, Seoul, South Korea
[2] ETRI, Biometr Technol Res Team, Taejon, South Korea
[3] Chosun Univ, Div Informat & Control Measurement Engn, Kwangju, South Korea
来源
TRUST, PRIVACY, AND SECURITY IN DIGITAL BUSINESS | 2005年 / 3592卷
关键词
biometrics; fingerprint verification; untrusted clients; embedded sensors;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we propose a secure and scalable solution for user authentication by using fingerprint verification on the sensor-client-server model, even with the client that is not necessarily trusted by the sensor holder or the server. In a typical implementation of fingerprint verification on the sensor-client-server model, the most time consuming step of the fingerprint verification, i.e., feature extraction, is assigned to a client because of real-time, scalability, and privacy issues. Compared to either a sensor or a server, however, the client connected to an open network and maintained by an individual user may be more vulnerable to Trojan Horse attacks. To protect Trojan Horse attacks launched at the untrusted client, our protocol has the fingerprint sensor to validate the result computed by the client for the feature extraction. However, the validation should be simple so that the resource-constrained fingerprint sensor can validate it in real-time. To solve this problem, we separate the feature extraction into binarization and minutiae extraction, and assign the time-consuming binarization to the client. After receiving the result of binarization from the client, the sensor conducts a simple validation algorithm to check the result, and then performs minutiae extraction and sends the extracted minutiae to the server. Based on the experimental results, the proposed solution for fingerprint verification can be performed on the sensor-client-server model securely, scalablely, and in real-time with the aid of an untrusted client.
引用
收藏
页码:299 / 310
页数:12
相关论文
共 50 条
  • [21] An Indirect Fingerprint Authentication Scheme in Cloud Computing
    Jiang, Xingchen
    Zheng, Jiande
    GREEN POWER, MATERIALS AND MANUFACTURING TECHNOLOGY AND APPLICATIONS III, PTS 1 AND 2, 2014, 484-485 : 986 - 990
  • [22] Design and use of a secure testing environment on untrusted hardware
    Carlisle, Martin C.
    Baird, Leemon C., III
    2007 IEEE INFORMATION ASSURANCE WORKSHOP, 2007, : 349 - +
  • [23] SeRFI: Secure Remote FPGA Initialization in an Untrusted Environment
    Duncan, Adam
    Nahiyan, Adib
    Rahman, Fahim
    Skipper, Grant
    Swany, Martin
    Lukefahr, Andrew
    Farahmandi, Farimah
    Tehranipoor, Mark
    2020 IEEE 38TH VLSI TEST SYMPOSIUM (VTS 2020), 2020,
  • [24] Secure and efficient data forwarding in untrusted cloud environment
    Balamanigandan Ramachandran
    Kamalraj Subramaniam
    Cluster Computing, 2019, 22 : 3727 - 3735
  • [25] Secure User Authentication in Cloud Computing
    Javaid, Zeeshan
    Ijaz, Imran
    PROCEEDINGS OF THE 2013 5TH INTERNATIONAL CONFERENCE ON INFORMATION & COMMUNICATION TECHNOLOGIES (ICICT 2013), 2013,
  • [26] Secure and efficient data forwarding in untrusted cloud environment
    Ramachandran, Balamanigandan
    Subramaniam, Kamalraj
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (02): : S3727 - S3735
  • [27] Secure password authentication for distributed computing
    Jung, Scung Wook
    Jung, Souhwan
    COMPUTATIONAL INTELLIGENCE AND SECURITY, 2007, 4456 : 491 - 501
  • [28] Secure password authentication for distributed computing
    Jung, Seung Wook
    Jung, Souhwan
    2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1345 - 1350
  • [29] Computing secure key rates for quantum cryptography with untrusted devices
    Tan, Ernest Y-Z
    Schwonnek, Rene
    Goh, Koon Tong
    Primaatmaja, Ignatius William
    Lim, Charles C-W
    NPJ QUANTUM INFORMATION, 2021, 7 (01)
  • [30] Differential Privacy Framework using Secure Computing on Untrusted Servers
    Jia, Jing
    Nishi, Hiroaki
    2023 IEEE 6TH INTERNATIONAL CONFERENCE ON INDUSTRIAL CYBER-PHYSICAL SYSTEMS, ICPS, 2023,