Capacity planning for scalable fingerprint authentication

被引:0
作者
Park, Byungkwan [1 ]
Moon, Daesung [1 ]
Chung, Yongwha [1 ]
Park, Jin-Won [1 ]
机构
[1] Korea Univ, Dept Comp & Informat Sci, Seoul, South Korea
来源
KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 1, PROCEEDINGS | 2006年 / 4251卷
关键词
performance evaluation; fingerprint verification; authentication protocol;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
As the fingerprint authentication technique becomes widely used at close range such as for the door lock, it will be applied for the remote user authentication as the next step. For large-scale remote user authentication services such as board control using bio-passport, the real-time as well as the security/privacy requirements should be satisfied. However, nothing is known about the collective performance of the fingerprint verification and the authentication protocol on the client-server model. In this paper, we analyzed the collective performance of the task assignment of the fingerprint authentication on the client-server model. To obtain the characteristics of the workload of both the fingerprint verification and the authentication protocol, we first consider three types of primitive operations on the client and the server; fingerprint verification module, cryptography module and communication module. Then, based on these primitive operations, the workload of each scenario of the task assignment was applied to the M/D/1 queueing model representing the client-server model, and the collective performance of each scenario was analyzed quantitatively. The modeling results showed that the server could handle the lowest level of workload when the server does decryption, verification and matching. On the contrary, the server can handle 9.57 times heavier workload when the clients do decryption, verification and matching. The modeling results also showed that the workload manageable by the server depends largely on the communication setup time.
引用
收藏
页码:906 / 915
页数:10
相关论文
共 9 条
[1]  
[Anonymous], 1999, Biometrics: personal identification in networked society
[2]   Biometric perils and patches [J].
Bolle, RM ;
Connell, JH ;
Ratha, NK .
PATTERN RECOGNITION, 2002, 35 (12) :2727-2738
[3]  
BURGER D., 1997, SIMPLESCALAR TOOL SE
[4]  
MALTONI D, 2003, HDB FINGERPRINTS REC
[5]  
MOON D, 2001, P INT WORKSH INF SEC, P449
[6]   A memory-efficient fingerprint verification algorithm using a multi-resolution accumulator array [J].
Pan, SB ;
Gil, YH ;
Moon, D ;
Chung, Y ;
Park, CH .
ETRI JOURNAL, 2003, 25 (03) :179-186
[7]  
Prabhakar S., 2003, IEEE Security & Privacy, V1, P33, DOI 10.1109/MSECP.2003.1193209
[8]   The uses and abuses of biometrics [J].
Schneier, B .
COMMUNICATIONS OF THE ACM, 1999, 42 (08) :136-136
[9]  
Stallings W., 2003, CRYPTOGRAPHY NETWORK