scholarly journals Multi-Layered Multimodal Biometric Authentication for Smartphone Devices

Author(s):  
Qurban A Memon

As technological advances in smartphone domain increase, so are the issues that pertain to security and privacy. In current literature, multimodal biometric approach is addressed at length for purpose of improving secured access into personal devices. Moreover, most of the financial institutions such as banks, etc. enforce two or three step access into their corporate data to enforce security. However, personal devices currently do not support similar applications or way of enforcing multilayered access to its different domains/regions of data. In this paper, a multilayered multimodal biometric approach using three biometric methods (such as finger print, face and voice) is proposed for smartphones. It is shown that fusion of biometric methods can be layered to enforce secured access to private data on smartphone. The experimental results are presented.

While Internet of Things (IoT) technology comprises of nodes that are self-configuring and intelligent which are interconnected in a dynamic network, utilization of shared resources has been revolutionized by the cloud computing effectively reducing the cost overheadamong the cloud users.The major concerns of IoT infrastructure are reliability, performance, security and privacy. Cloud computing is popular for its unlimited storage and processing power. Cloud computing is much more matured with the capability to resolve most of the issues in IoT technology. A suitable way to address most of the issues in IoT technology is by integrating IoTparadigm into the Cloud technology.In this regard, we propose a methodology of applying our EPAS scheme for IoT applications. In our previous work[2] , we have proposed an Enhanced Privacy preserving gene based data Aggregation Scheme (EPAS) for private data transmission and storage by utilizing Enhanced P-Gene erasable data hiding approach. Enhanced P-Gene scheme ensures secure transmission and storage of private data by relying on a data aggregation scheme fully dependent on erasable data hiding technique. In the current work we analyse the applicability of the EPAS scheme for IoT applications. Experimental results show the suitability of the proposed scheme for application involving numeric data and also demonstrates performance improvement with existing proposals for data aggregation in cloud.


2021 ◽  
Vol 108 (Supplement_7) ◽  
Author(s):  
Hock Ping Cheah ◽  
Samantha Quah ◽  
Kenneth Wong

Abstract Aims Electronic communication amongst surgical team members improves the team's ability to care for patients. Security and privacy of patient data are significant concerns. Recent controversy involving private data collection with WhatsApp has led to many users changing to other forms of messaging apps to protect user privacy. The aim of this study is the analyse the efficiency and effectiveness of the Signal messaging app in a research setting in Australia. Methods Members of our research group comprising three junior doctors and a supervising consultant surgeon used the Signal app as our main method of communication to discuss matters relating to our various research projects. No patient details were discussed in the messaging app. Results A total of 234 personal and 148 group messages were sent during the study period in a group and personal message setting. Most messages including picture files sent were received within one minute by the recipient. We did encounter a 24 hour period where Signal encountered some technical difficulties and some messages did not go through. Conclusion Signal messaging app is a good alternative to WhatsApp messaging app with better user privacy protection. With more user uptake on Signal app, it has the potential to be used for clinical care as Signal also provides end-to-end encryption to protect patient privacy.


Author(s):  
Shanthi Sivakumar

The number of users using the internet has drastically increased. Due to the large number of online users, demand has increased in various fields like social networks, knowledge sharing, commerce, etc. to protect the user's private data as well as control access. Unfortunately, the need for security and authentication for individual data also increased. In an attempt to confront the new risks unveiled by the networking revolution over the recent years, we need an efficient means for automatically recognizing the identity of individuals. Biometric authentication provides an improved level of security and paves the way to the future. Further, biometric authentication systems are classified as physiological biometric and behavioral biometric technologies. Further, the author provides ideas on research challenges and the future of authentication systems.


Cyber Crime ◽  
2013 ◽  
pp. 1778-1796
Author(s):  
Xunhua Wang ◽  
Hua Lin

Entity authentication is a fundamental building block for system security and has been widely used to protect cyber systems. Nonetheless, the role of cryptography in entity authentication is not very clear, although cryptography is known for providing confidentiality, integrity, and non-repudiation. This chapter studies the roles of cryptography in three entity authentication categories: knowledge-based authentication, token-based authentication, and biometric authentication. For these three authentication categories, we discuss (1) the roles of cryptography in the generation of password verification data, in password-based challenge/response authentication protocol, and in password-authenticated key exchange protocols; (2) the roles of cryptography in both symmetric key-based and private key-based token authentications; (3) cryptographic fuzzy extractors, which can be used to enhance the security and privacy of biometric authentication. This systematic study of the roles of cryptography in entity authentication will deepen our understanding of both cryptography and entity authentication and can help us better protect cyber systems.


2021 ◽  
pp. 20-46
Author(s):  
James E. Cutting

People’s aesthetic appreciation for any art is bound to the craft of its artists, and that craft is deeply affected by the technology available. Movies have evolved through a long series of venues and technological advances—theaters to shrinking personal devices; roll film with sprockets added; increased frame rates; the standardizations with added sound; experiments with color, aspect ratios, and contrast; and the move to a digital format. This chapter traces these and the consequent psychological improvements in viewer engagement that they fostered—for example, the creation of motion also created aversive flicker, but flicker was then diminished by increasing frame rates and was eliminated by digital delivery. Sound had profound effects, among other things creating a temporary deglobalization of cinema. Color increased discriminability and punctuated the change of scenes. And increased aspect ratios more firmly stimulated people’s systems of balance and the feeling of presence.


2011 ◽  
pp. 1703-1713
Author(s):  
Sherrie D. Cannoy

There is growing concern that the healthcare industry has not adopted IT systems as widely and effectively as other industries. Healthcare technological advances generally emerge from the clinical and medical areas rather than clerical and administrative. The healthcare industry is perceived to be 10 to 15 years behind other industries in its use of information technology (Raghupathi & Tan, 1997). Incorporating new technology into the healthcare organization’s processes is risky because of the potential for patient information being disclosed. The purpose of this study is to investigate the information assurance factors involved with security regulations and electronic medical record initiatives—a first necessary step in making the healthcare industry more efficient. Noncompliance of a healthcare organization’s employees with security and privacy policies (i.e., information assurance) can result in legal and financial difficulties, as well as irreparable damage to an organization’s reputation. To implement electronic medical initiatives, it is vital that an organization has compliance with security and privacy policies. E-health technology is a relatively current phenomenon. There are two types of distance-related healthcare that are technology driven. Telehealth is known for involving telemedicine—medicine practiced over a distance, with the impetus of control being in the physician’s hands (Maheu, 2000). E-health involves the patient or physician actively searching for information or a service, usually via the Internet (Maheu). Electronic medical records fall into the e-health category because the physician, healthcare partners, and patient would be able to access the information through an Internet connection.


2020 ◽  
pp. 197-200
Author(s):  
Saranya K ◽  
Rajasekar S S ◽  
Nagarajan B

Now a days the security dangers in the online ex-changes, ATM money withdrawals’ have expanded on a substan-tial scale. Individuals in the country zone are as yet ignorant of these dangers are as yet encountering many loses. Individuals unconscious of these dangers don't perceive that sharing their ATM PIN number, yet additionally sharing their credit/debit card number and CCV can likewise prompt the getting to of financial balance without their insight. In this way, in this proposed framework it is said that the credit/debit card number and CCV are being supplanted with dynamically produced QR codes. This QR code that is created can't be reproduced or hacked as effec-tively as the current framework. In the present framework OTP is sent to authenticate our transactions. This OTP is additionally added with Bio-metric confirmation like unique finger-print, iris information. This provides an additionally improved verification amid all the ATM exchanges. The execution on the above framework is basic as all the financial accounts are now linked with Aadhar card. And this can be implementing the QR code scanner alongside unique finger-print scanner and iris scanner in later stages. This never enables the unapproved clients to access or make any installments without the respective of the account holders. This expands the security level and furthermore enables the client to the exchange cash all the more securely. The pro-posed framework improves the security in the exchanges in our everyday life as no ATM withdrawal or Deposit should be possi-ble without the QR code and the Account holder themselves.


2021 ◽  
Vol 11 (18) ◽  
pp. 8767
Author(s):  
Yazeed Alabdulkarim ◽  
Abdulmajeed Alameer ◽  
Mohammed Almukaynizi ◽  
Abdulaziz Almaslukh

The COVID-19 pandemic has caused many countries around the globe to put strict policies and measures in place in an attempt to control the rapid spread of the virus. These measures have affected economic activities and have impacted a broad range of businesses, such as international traveling, restaurants, and shopping malls. As COVID-19 vaccination efforts progress, countries are starting to relax international travel constraints and permit passengers from certain destinations to cross the border. Moreover, travelers from those destinations are likely required to provide certificates of vaccination results or negative COVID-19 tests before crossing the borders. Implementing these travel guidelines requires sharing information between countries, such as the number of COVID-19 cases and vaccination certificates for travelers. In this paper, we introduce SPIN, a framework leveraging a permissioned blockchain for sharing COVID-19 information between countries. This includes public data, such as the number of vaccinated people, and private data, such as vaccination certificates for individuals. Additionally, we employ cancelable fingerprint templates to authenticate private information about travelers. We analyze the framework from scalability, efficiency, security, and privacy perspectives. To validate our framework, we provide a prototype implementation using the Hyperledger Fabric platform.


2019 ◽  
Vol 2019 ◽  
pp. 1-11 ◽  
Author(s):  
Yuwen Pu ◽  
Jin Luo ◽  
Chunqiang Hu ◽  
Jiguo Yu ◽  
Ruifeng Zhao ◽  
...  

As the next generation of information and communication infrastructure, Internet of Things (IoT) enables many advanced applications such as smart healthcare, smart grid, smart home, and so on, which provide the most flexibility and convenience in our daily life. However, pervasive security and privacy issues are also increasing in IoT. For instance, an attacker can get health condition of a patient via analyzing real-time records in a smart healthcare application. Therefore, it is very important for users to protect their private data. In this paper, we present two efficient data aggregation schemes to preserve private data of customers. In the first scheme, each IoT device slices its actual data randomly, keeps one piece to itself, and sends the remaining pieces to other devices which are in the same group via symmetric encryption. Then, each IoT device adds the received pieces and the held piece together to get an immediate result, which is sent to the aggregator after the computation. Moreover, homomorphic encryption and AES encryption are employed to guarantee secure communication. In the second scheme, the slicing strategy is also employed. Noise data are introduced to prevent the exchanged actual data of devices from disclosure when the devices blend data each other. AES encryption is also employed to guarantee secure communication between devices and aggregator, compared to homomorphic encryption, which has significantly less computational cost. Analysis shows that integrity and confidentiality of IoT devices’ data can be guaranteed in our schemes. Both schemes can resist external attack, internal attack, colluding attack, and so on.


Sign in / Sign up

Export Citation Format

Share Document