IMBUA: Identity Management on Blockchain for Biometrics-Based User Authentication

Author(s):  
Vanga Odelu
Electronics ◽  
2021 ◽  
Vol 10 (15) ◽  
pp. 1819
Author(s):  
Rasa Bruzgiene ◽  
Konstantinas Jurgilas

Information systems of critical infrastructure provide services on which the core functions of a state and its economy depend as well as welfare of society. Such systems are becoming an increasingly common target for crimes and attacks in cyberspace, as their vulnerabilities can be exploited for malicious activities seeking financial or political gain. One of the main reasons that threatens the security of these systems is the weak control of remote access, otherwise defined as management of a system’s user identity. Management of user identity depends on user authentication, authorization and the assignment of certain rights in the digital space. This paper provides the proposed two-factor (2FA) digital authentication method for remote access to an information system of a critical infrastructure. Results of testing the method’s usability and resilience to cyber threats have shown that the system, in which the method was implemented, is protected from dangerous HTTP requests and publicly available system’s endpoints are protected from threatening inputs that could cause malicious activities on the critical infrastructure. Additionally, the implementation of the authentication API application ensures the rapidity of the method for less than 500 ms for 100 users working in parallel with the system at the same time.


Author(s):  
Kumbesan Sandrasegaran ◽  
Mo Li

The broad aim of identity management (IdM) is to manage the resources of an organization (such as files, records, data, and communication infrastructure and services) and to control and manage access to those resources in an efficient and accurate way. Consequently, identity management is both a technical and process-orientated concept. The concept of IdM has begun to be applied in identities-related applications in enterprises, governments, and Web services since 2002. As the integration of heterogeneous wireless networks becomes a key issue in towards the next generation (NG) networks, IdM will be crucial to the success of NG wireless networks. A number of issues, such as mobility management, multi-provider and securities require the corresponding solutions in terms of user authentication, access control, and so forth. IdM in NG wireless networks is about managing the digital identity of a user and ensuring that users have fast, reliable, and secure access to distributed resources and services of an next generation network (NGN) and the associated service providers, across multiple systems and business contexts.


2009 ◽  
Vol 5 (2) ◽  
pp. 105-124 ◽  
Author(s):  
V. Conti ◽  
C. Militello ◽  
F. Sorbello ◽  
S. Vitabile

The development and the diffusion of distributed systems, directly connected to recent communication technologies, move people towards the era of mobile and ubiquitous systems. Distributed systems make merchant-customer relationships closer and more flexible, using reliable e-commerce technologies. These systems and environments need many distributed access points, for the creation and management of secure identities and for the secure recognition of users. Traditionally, these access points can be made possible by a software system with a main central server. This work proposes the study and implementation of a multimodal technique, based on biometric information, for identity management and personal ubiquitous authentication. The multimodal technique uses both fingerprint micro features (minutiae) and fingerprint macro features (singularity points) for robust user authentication. To strengthen the security level of electronic payment systems, an embedded hardware prototype has been also created: acting as self-contained sensors, it performs the entire authentication process on the same device, so that all critical information (e.g. biometric data, account transactions and cryptographic keys), are managed and stored inside the sensor, without any data transmission. The sensor has been prototyped using the Celoxica RC203E board, achieving fast execution time, low working frequency, and good recognition performance.


2018 ◽  
Vol 3 (2) ◽  
pp. 8
Author(s):  
Kashif Nisar ◽  
Shamsuddeen Bala ◽  
AbubakarAminu Mu’azu ◽  
Ibrahim A Lawal

Third-party identity management user authentication process using single sign-on (SSO) in distributed computer networks requires modification as the process of authenticating user to log into relying party (RP) resources by either identity provider (IDP) or hybrid relying party (HRP) depend always on the authentication of user logins. In this research an algorithm is proposed to authenticate user only once by recording and encrypting user credential with one-way hashing algorithm (SHA2), this simplifies user subsequent logins into relying party by confirming user credentials without other authentication by IDP or HRP. Authentication time and response time continuous time plot of the proposed algorithm was plotted with respect to the arrival time of users in which we show the relationship of authentication time and response time with random arrival rate of users.


2011 ◽  
pp. 481-496
Author(s):  
Gottfried Vossen ◽  
Peter Westerkamp

E-learning environments and their system functionalities resemble one another to a large extent. Recent standardization efforts in e-learning concentrate on the reuse of learning material, but not on the reuse of application or system functionalities. The LearnServe system under development at the University of Muenster builds on the assumption that a typical learning system is a collection of activities or processes that interact with learners and suitably chosen content, the latter in the form of Learning Objects. This enables us to divide the main functionality of an e-learning system into a number of stand-alone applications or services. The realization of these applications based on the emerging technical paradigm of Web services then renders a wide reuse of functionality possible, thereby giving learners a higher flexibility of choosing content and functionalities to be included in their learning environment. In such a scenario, it must, however, be possible to maintain user identity and data across service and server boundaries. This paper presents an architecture for implementing user authentication and the manipulation of user data across several Web services. In particular, it demonstrates how to exploit the SPML and SAML standards so that cross-domain single sign-on can be offered to the users of a service-based learning environment. The paper also discusses how this is being integrated into LearnServe.


Sign in / Sign up

Export Citation Format

Share Document