scholarly journals Extending identity management system with multimodal biometric authentication

2016 ◽  
Vol 13 (2) ◽  
pp. 313-334
Author(s):  
Bojan Jovanovic ◽  
Ivan Milenkovic ◽  
Marija Bogicevic-Sretenovic ◽  
Dejan Simic

Techniques for authentication that are used in today's identity management systems are vulnerable when they are used over the network. In order to prevent fraud and unauthorized data access, it is important to ensure the identity of the person who submitted authentication credentials. The authentication process can be additionally secured by using biometric data for user verification. Moreover, precision of biometric authentication can be improved by the use of multimodal biometrics. This paper presents a system which has been designed for identity management based on FreeIPA solution for digital identity management and MMBio framework for multimodal biometrics. Proposed system provides multifactor authentication, where MMBio framework is used for handling user biometric data. Developed prototype confirms possible integration of identity management and multimodal biometric systems.

Author(s):  
Reema Bhatt ◽  
Manish Gupta ◽  
Raj Sharman

Identity management is the administration of an individual's access rights and privileges in the form of authentication and authorization within or across systems and organizations. An Identity Management system (IdM) helps manage an individual's credentials through the establishment, maintenance, and eventual destruction of their digital identity. Numerous products, applications, and platforms exist to address the privacy requirements of individuals and organizations. This chapter highlights the importance of IdM systems in the highly vulnerable security scenario that we live in. It defines and elaborates on the attributes and requirements of an effective identity management system. The chapter helps in establishing an understanding of frameworks that IdM systems follow while helping the reader contrast between different IdM architecture models. The latter part of this chapter elaborates on some of today's most popular IdM solutions.


2016 ◽  
pp. 129-155
Author(s):  
Reema Bhatt ◽  
Manish Gupta ◽  
Raj Sharman

Identity management is the administration of an individual's access rights and privileges in the form of authentication and authorization within or across systems and organizations. An Identity Management system (IdM) helps manage an individual's credentials through the establishment, maintenance, and eventual destruction of their digital identity. Numerous products, applications, and platforms exist to address the privacy requirements of individuals and organizations. This chapter highlights the importance of IdM systems in the highly vulnerable security scenario that we live in. It defines and elaborates on the attributes and requirements of an effective identity management system. The chapter helps in establishing an understanding of frameworks that IdM systems follow while helping the reader contrast between different IdM architecture models. The latter part of this chapter elaborates on some of today's most popular IdM solutions.


2021 ◽  
Vol 13 (03) ◽  
pp. 43-59
Author(s):  
Maha Aldosary ◽  
Norah Alqahtani

An efficient identity management system has become one of the fundamental requirements for ensuring safe, secure, and transparent use of identifiable information and attributes. Federated Identity Management (FIdM) allows users to distribute their identity information across security domains which increases the portability of their digital identities, and it is considered a promising approach to facilitate secure resource sharing among collaborating participants in heterogeneous IT environments. However, it also raises new architectural challenges and significant security and privacy issues that need to be mitigated. In this paper, we provide a comparison between FIdM architectures, presented the limitations and risks in FIdM system, and discuss the results and proposed solutions.


2018 ◽  
Vol 9 (1) ◽  
pp. 63-78 ◽  
Author(s):  
Vikas Kumar ◽  
Aashish Bhardwaj

This article describes how in today's digital world, customers have made it a common practice to maintain user accounts with different service providers to access a range of services. In such environment, all attributes of the identity must be verified to operate, otherwise the resources would be vulnerable to financial and data loss. This article contends that makes it important to form an Identity Management System, which could provide central administration, user self- service, role based access control and integrated user management. Identity Management becomes very much vital for the environment working with multiple technologies, as it governs an entity (i.e. a human or a software agent) to authenticate and authorize for accessing the network via multiple technologies. Successful Identity Management increases the efficiency, security, access control and decreases the complexity, cost and many repetitive works. Essential features of present day identity management systems have been identified in the present work. A comparative analysis of these identity management systems has been carried out to establish the present-day industry practices. Along with that, specific challenges to the present-day identity management systems have been identified. The article helps in the identification of suitable Identity Management System for specific applications.


2019 ◽  
Vol 2019 ◽  
Author(s):  
Job Mwaura

In the past few years, Kenya’s digital landscape has transformed and this has been made possible by proliferation of the usage of digital technologies, particularly - mobile phones. Due to increased access to digital technologies, faster internet speeds, increased securitization among other issues, data on individuals in online spaces has also increased. Recently, the government rolled out a National Integrated Identity Management System (NIIMS) which is meant to capture biometric data but this has generated a huge debate online in Kenya under the hashtag #ResistHudumaNamba. This paper will therefore examine the following issues: What has contributed to the decline of trust between the government and its citizens when it comes to internet technologies? What are the actual sentiments given for and against in the introduction of Huduma Number? What are the underlying reasons for continued registration of individuals in Kenya? This research will be a qualitative research study. Data will be generated from social media sites (Twitter and Facebook), as well as blog posts and newspaper articles. A discourse analysis of the events around #ResistsHudumaNamba in these sources will be done so as to answer the research questions. This research has the potential to contribute to literature on trust in sub-Saharan Africa as well as establish trust issues between government and citizens when digital technologies are involved.


Sign in / Sign up

Export Citation Format

Share Document