scholarly journals Integrated Framework for Anonymous Biometric Key Based Identity Management System

2019 ◽  
Vol 8 (3) ◽  
pp. 4594-4601

Implementation of measures to ensure security of transactions while ensuring privacy of user credentials is an area of challenge in digital transactions over a network. Integration of biometric pattern matching into an identity management system (IMS) enhances security of transactions and improves ease of use. Privacy of users in a biometric based system is improved by using keys generated directly from feature sets instead of conventional stored templates. This paper proposes a framework for integrating biometric key based authentication into an IMS.The generated keys need to be long, reproducible with high integrity and need to possess sufficient entropy. Generation of keys directly from feature traits poses a challenge due to intra and inter user variations inherent to biometric data. A novel methodology for generating and integrating crytpo keys into an identity management system is proposed. The keys have been extracted from iris trait. 300 bits keys have been extracted from iris datasets. The results are promising and can be extended to multi-modal biometric feature sets.

TEM Journal ◽  
2020 ◽  
pp. 1338-1347
Author(s):  
Belkacem Athamena ◽  
Zina Houhamdi

This paper describes the identity management system (IdMS) by defining system and user requirements. Additionally, it introduces the IdMS concept that approaches the things identity management. Moreover, the paper deeply describes the IdMS features using unified modelling language (UML) diagrams such as class, system, and sequence diagrams to show the main system functionalities. Ultimately, the suggested system is evaluated by comparing it with the existing systems and discussing the fulfilment of user and system requirements.


2019 ◽  
Vol 2019 ◽  
Author(s):  
Job Mwaura

In the past few years, Kenya’s digital landscape has transformed and this has been made possible by proliferation of the usage of digital technologies, particularly - mobile phones. Due to increased access to digital technologies, faster internet speeds, increased securitization among other issues, data on individuals in online spaces has also increased. Recently, the government rolled out a National Integrated Identity Management System (NIIMS) which is meant to capture biometric data but this has generated a huge debate online in Kenya under the hashtag #ResistHudumaNamba. This paper will therefore examine the following issues: What has contributed to the decline of trust between the government and its citizens when it comes to internet technologies? What are the actual sentiments given for and against in the introduction of Huduma Number? What are the underlying reasons for continued registration of individuals in Kenya? This research will be a qualitative research study. Data will be generated from social media sites (Twitter and Facebook), as well as blog posts and newspaper articles. A discourse analysis of the events around #ResistsHudumaNamba in these sources will be done so as to answer the research questions. This research has the potential to contribute to literature on trust in sub-Saharan Africa as well as establish trust issues between government and citizens when digital technologies are involved.


Author(s):  
A. Shobanadevi ◽  
Sumegh Tharewal ◽  
Mukesh Soni ◽  
D. Dinesh Kumar ◽  
Ihtiram Raza Khan ◽  
...  

Author(s):  
Kenneth J. Giuliani ◽  
V. Kumar Murty

The purpose of this chapter is to examine the strengths and weaknesses of the most commonly used model for digital identities. It is compared to other models which have preceded it, thus giving a background on its development. The models are measured against a set of criteria which it is desirable for an identity management system to have. The underlying hope is that understanding this model will help improve it or even lead to a different model.


Author(s):  
Reema Bhatt ◽  
Manish Gupta ◽  
Raj Sharman

Identity management is the administration of an individual's access rights and privileges in the form of authentication and authorization within or across systems and organizations. An Identity Management system (IdM) helps manage an individual's credentials through the establishment, maintenance, and eventual destruction of their digital identity. Numerous products, applications, and platforms exist to address the privacy requirements of individuals and organizations. This chapter highlights the importance of IdM systems in the highly vulnerable security scenario that we live in. It defines and elaborates on the attributes and requirements of an effective identity management system. The chapter helps in establishing an understanding of frameworks that IdM systems follow while helping the reader contrast between different IdM architecture models. The latter part of this chapter elaborates on some of today's most popular IdM solutions.


Sign in / Sign up

Export Citation Format

Share Document