Design and Analysis of a Highly User-Friendly, Secure, Privacy-Preserving, and Revocable Authentication Method

被引:20
作者
Sui, Yan [1 ]
Zou, Xukai [1 ]
Du, Eliza Y. [2 ]
Li, Feng [3 ]
机构
[1] Indiana Univ Purdue Univ, Dept Comp & Informat Sci, Indianapolis, IN 46202 USA
[2] Indiana Univ Purdue Univ, Dept Elect & Comp Engn, Indianapolis, IN 46202 USA
[3] Indiana Univ Purdue Univ, Dept Comp & Informat Technol, Indianapolis, IN 46202 USA
关键词
Authentication; privacy-preserving; cancelable biometrics (CB); biometric cryptosystem (BCS); BioCapsule (BC); secure fusion; BIOMETRICS; IMAGE; SECRET;
D O I
10.1109/TC.2013.25
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A large portion of system breaches are caused by authentication failure, either during the login process or in the post-authentication session; these failures are themselves related to the limitations associated with existing authentication methods. Current authentication methods, whether proxy based or biometrics based, are not user-centric and/or endanger users' (biometric) security and privacy. In this paper, we propose a biometrics based user-centric authentication approach. This method involves introducing a reference subject (RS), securely fusing the user's biometrics with the RS, generating a BioCapsule (BC) from the fused biometrics, and employing BCs for authentication. Such an approach is user friendly, identity bearing yet privacy-preserving, resilient, and revocable once a BC is compromised. It also supports "one-click sign-on" across systems by fusing the user's biometrics with a distinct RS on each system. Moreover, active and non-intrusive authentication can be automatically performed during post-authentication sessions. We formally prove that the secure fusion based approach is secure against various attacks. Extensive experiments and detailed comparison with existing approaches show that its performance (i.e., authentication accuracy) is comparable to existing typical biometric approaches and the new BC based approach also possesses many desirable features such as diversity and revocability.
引用
收藏
页码:902 / 916
页数:15
相关论文
共 67 条
[1]   A new biometric technology based on mouse dynamics [J].
Ahmed, Ahmed Awad E. ;
Traore, Issa .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2007, 4 (03) :165-179
[2]  
[Anonymous], CASIA IRISV1
[3]  
[Anonymous], 2003, MATLAB SOURCE CODE B
[4]  
[Anonymous], ACM C COMP COMM EXC
[5]  
[Anonymous], IEEE T INFORM FORENS
[6]  
[Anonymous], 2007, COMPUTER VISION PATT, DOI DOI 10.1109/CVPR.2007.383110
[7]  
[Anonymous], TRCTIT0752
[8]  
[Anonymous], 2010, Information Forensics and Security (WIFS), 2010 IEEE International Workshop on
[9]  
[Anonymous], AAIEP04846 ETD COLL
[10]  
[Anonymous], P 6 IB C INF SYST TE