scholarly journals Optimized Authentication System with High Security and Privacy

Electronics ◽  
2021 ◽  
Vol 10 (4) ◽  
pp. 458
Author(s):  
Uttam Sharma ◽  
Pradeep Tomar ◽  
Syed Sadaf Ali ◽  
Neetesh Saxena ◽  
Robin Singh Bhadoria

Authentication and privacy play an important role in the present electronic world. Biometrics and especially fingerprint-based authentication are extremely useful for unlocking doors, mobile phones, etc. Fingerprint biometrics usually store the attributes of the minutia point of a fingerprint directly in the database as a user template. Existing research works have shown that from such insecure user templates, original fingerprints can be constructed. If the database gets compromised, the attacker may construct the fingerprint of a user, which is a serious security and privacy issue. Security of original fingerprints is therefore extremely important. Ali et al. have designed a system for secure fingerprint biometrics; however, their technique has various limitations and is not optimized. In this paper, first we have proposed a secure technique which is highly robust, optimized, and fast. Secondly, unlike most of the fingerprint biometrics apart from the minutiae point location and orientation, we have used the quality of minutiae points as well to construct an optimized template. Third, the template constructed is in 3D shell shape. We have rigorously evaluated the technique on nine different fingerprint databases. The obtained results from the experiments are highly promising and show the effectiveness of the technique.

Author(s):  
Uppuluri Sirisha ◽  
G. Lakshme Eswari

This paper briefly introduces Internet of Things(IOT) as a intellectual connectivity among the physical objects or devices which are gaining massive increase in the fields like efficiency, quality of life and business growth. IOT is a global network which is interconnecting around 46 million smart meters in U.S. alone with 1.1 billion data points per day[1]. The total installation base of IOT connecting devices would increase to 75.44 billion globally by 2025 with a increase in growth in business, productivity, government efficiency, lifestyle, etc., This paper familiarizes the serious concern such as effective security and privacy to ensure exact and accurate confidentiality, integrity, authentication access control among the devices.


i-com ◽  
2019 ◽  
Vol 18 (3) ◽  
pp. 197-216 ◽  
Author(s):  
Verena Zimmermann ◽  
Paul Gerber ◽  
Karola Marky ◽  
Leon Böck ◽  
Florian Kirchbuchner

AbstractSmart Home technologies have the potential to increase the quality of life, home security and facilitate elderly care. Therefore, they require access to a plethora of data about the users’ homes and private lives. Resulting security and privacy concerns form a relevant barrier to adopting this promising technology. Aiming to support end users’ informed decision-making through addressing the concerns we first conducted semi-structured interviews with 42 potential and little-experienced Smart Home users. Their diverse concerns were clustered into four themes that center around attacks on Smart Home data and devices, the perceived loss of control, the trade-off between functionality and security, and user-centric concerns as compared to concerns on a societal level. Second, we discuss measures to address the four themes from an interdisciplinary perspective. The paper concludes with recommendations for addressing user concerns and for supporting developers in designing user-centered Smart Home technologies.


2017 ◽  
Vol 7 (1.1) ◽  
pp. 19
Author(s):  
T. Nusrat Jabeen ◽  
M. Chidambaram ◽  
G. Suseendran

Security and privacy has emerged to be a serious concern in which the business professional don’t desire to share their classified transaction data. In the earlier work, secured sharing of transaction databases are carried out. The performance of those methods is enhanced further by bringing in Security and Privacy aware Large Database Association Rule Mining (SPLD-ARM) framework. Now the Improved Secured Association Rule Mining (ISARM) is introduced for the horizontal and vertical segmentation of huge database. Then k-Anonymization methods referred to as suppression and generalization based Anonymization method is employed for privacy guarantee. At last, Diffie-Hellman encryption algorithm is presented in order to safeguard the sensitive information and for the storage service provider to work on encrypted information. The Diffie-Hellman algorithm is utilized for increasing the quality of the system on the overall by the generation of the secured keys and thus the actual data is protected more efficiently. Realization of the newly introduced technique is conducted in the java simulation environment that reveals that the newly introduced technique accomplishes privacy in addition to security.


2020 ◽  
Vol 8 (10) ◽  
pp. 305-315
Author(s):  
Martin Mariyanov ◽  

Introduction:With the constant improvement of technology in recent years, mobile dental photography is gaining more and more popularity. Mobile phones have almost completely replaced compact cameras in everyday life. Aim:The aim is to determine whether a mobile phone can be used to take standard pictures of patients in daily dental practice. Material and methods:A total of 330extraoral photographs were taken of 33 patients. 10 photos were taken of each of them (5 extraoral and 5 intraoral).From the five photos there were one taken with a DSLR camera and four with a mobile phone with different magnification x2, x3, x4 and x5 and respectively from different distances. Eleven linear parameters were measured and compared. Results: In the photos taken with a mobile phone there is a deformation of the image compared to the photos taken with a DSLR camera at all magnifications. The largest deformation is at twice the magnification. The image is close to the photos taken with a DSLR camera at four and five times the magnification. Conclusion:The mobile phone is applicable for the extraoral dental photography. At four times magnification(x4) and distance of 110 cm the deformation of the image is negligible and the quality of the photos is good. For the intraoral photos if there is a need for an image with the correct and as close as possible to the actual proportions of the teeth, the first choice is the DSLR camera.


Author(s):  
MOHAMMED S. KHALIL ◽  
FAJRI KURNIAWAN ◽  
KASHIF SALEEM

Over the past decade, there have been dramatic increases in the usage of mobile phones in the world. Currently available smart mobile phones are capable of storing enormous amounts of personal information/data. The smart mobile phone is also capable of connecting to other devices, with the help of different applications. Consequently, with these connections comes the requirement of security to protect personal information. Nowadays, in many applications, a biometric fingerprint recognition system has been embedded as a primary security measure. To enable a biometric fingerprint recognition system in smart mobile phones, without any additional costs, a built-in high performance camera can be utilized. The camera can capture the fingerprint image and generate biometric traits that qualify the biometric fingerprint authentication approach. However, the images acquired by a mobile phone are entirely different from the images obtained by dedicated fingerprint sensors. In this paper, we present the current trend in biometric fingerprint authentication techniques using mobile phones and explore some of the future possibilities in this field.


2015 ◽  
Vol 22 (4) ◽  
pp. 104-112 ◽  
Author(s):  
Kuan Zhang ◽  
Kan Yang ◽  
Xiaohui Liang ◽  
Zhou Su ◽  
Xuemin Shen ◽  
...  

Author(s):  
Ingrid Noguera ◽  
Anna-Elena Guerrero-Roldán ◽  
Esther Huertas ◽  
Roger Roca ◽  
David Bañeres

Author(s):  
Benjamin Falchuk ◽  
David Famolari ◽  
Russell Fischer ◽  
Shoshana Loeb ◽  
Euthimios Panagos

Applications accessible through mobile devices, such as mobile phones, are playing an increasingly important part in the delivery of high quality and personalized healthcare services. In this paper, we examine current usage of mobile devices and networks by mobile healthcare applications, and present our views on how mobile devices and networks could be used for creating patient-centered healthcare applications. The patient-centered healthcare paradigm allows for increased quality of care and quality of life for patients while increasing personal freedom to move about and be always connected to care-givers and healthcare services. The structure of our discussion is analogous to layered protocol stack in communications, progressing from the network and radio technologies, servicing middleware, cloud services, health sensors, mobile smartphones, and applications. All these layers come into play to support future mobile healthcare services.


Author(s):  
Harkeerat Bedi ◽  
Li Yang ◽  
Joseph M. Kizza

Fair exchange between a pair of parties can be defined as the fundamental concept of trade where none of the parties involved in the exchange have an unfair advantage over the other once the transaction completes. Fair exchange protocols are a group of protocols that provide means for accomplishing such fair exchanges. In this chapter we analyze one such protocol which offers means for fair contract signing, where two parties exchange their commitments over a pre-negotiated contract. We show that this protocol is not entirely fair and illustrate the possibilities of one party cheating by obtaining the other’s commitment and not providing theirs. We also analyze a revised version of this protocol which offers better fairness by handling many of the weaknesses. Both these protocols however fail to handle the possibilities of replay attacks where an intruder replays messages sent earlier from one party to the other. Our proposed protocol improves upon these protocols by addressing to the weaknesses which leads to such replay attacks. We implement a complete working system which provides fair contract signing along with properties like user authentication and efficient password management achieved by using a fingerprint based authentication system and features like confidentiality, data-integrity and non-repudiation accomplished through implementation of cryptographic algorithms based on elliptic curves.


Sign in / Sign up

Export Citation Format

Share Document