Enhancing Security and Privacy in Enterprises Network by Using Biometrics Technologies

Of course, in all world countries, commercial and industrial enterprises play an important role in the development of their economics. Recently, the change in enterprise operation mode, such as their activities speed in terms of production and transport, requires integration of these activities into a private and/or public networks structure in order to achieve many benefits such as the time and the cost. So, for an effective development, these enterprises must be connected with them in order to exchange necessary information. Thus, the resultant of this leads to emergence of special structure, called Enterprises Network (EN), which allows such enterprise to more effectively interact with others enterprises inside and outside their activities. The challenges that oppose this structure are the concerns of transmitted data security which are exchanged between them as well as the privacy issues, which ensure the secrecy of enterprise information. In contrast with other approaches presented in literature, a complete biometric cryptosystem is presented. Based on the obtained results, it can be inferred that the proposed authentication system is highly secure, effective and cheap, which are vital for any authentication system to gain enterprise confidence for implementation in real time secure access control systems.

[1]  Eul Gyu Im,et al.  Malware analysis using visualized images and entropy graphs , 2014, International Journal of Information Security.

[2]  Bruce Schneier,et al.  Applied cryptography (2nd ed.): protocols, algorithms, and source code in C , 1995 .

[3]  Pierre-Jean Charrel,et al.  AspeCis: An Aspect-Oriented Approach to Develop a Cooperative Information System , 2011, MEDI.

[4]  Li Lei,et al.  Palmprint verification based on 2D - Gabor wavelet and pulse-coupled neural network , 2012, Knowl. Based Syst..

[5]  Sheng-Wen Shih,et al.  Biometric recognition by fusing palmprint and hand-geometry based on morphology , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.

[6]  Rik Eshuis,et al.  Dynamic business network process management in instant virtual enterprises , 2009, Comput. Ind..

[7]  Mauro Barni,et al.  eSketch: a privacy-preserving fuzzy commitment scheme for authentication using encrypted biometrics , 2010, MM&Sec '10.

[8]  Robert A. J. Matthews,et al.  On the Derivation of a "Chaotic" Encryption Algorithm , 1989, Cryptologia.

[9]  Hye Kyung Park,et al.  Virtual enterprise — Information system and networking solution , 1999 .

[10]  Adel M. Alimi,et al.  Personal recognition system using hand modality based on local features , 2015, 2015 11th International Conference on Information Assurance and Security (IAS).

[11]  Ahmed Bouridane,et al.  An Automated Finger-Knuckle-Print Identification System Using Jointly RBF & RFT Classifiers , 2016, 2016 15th International Conference on Ubiquitous Computing and Communications and 2016 International Symposium on Cyberspace and Security (IUCC-CSS).

[12]  Michal Choras,et al.  Image Feature Extraction Methods for Ear Biometrics--A Survey , 2007, 6th International Conference on Computer Information Systems and Industrial Management Applications (CISIM'07).

[13]  Helen C. Shen,et al.  Personal Verification Using Palmprint and Hand Geometry Biometric , 2003, AVBPA.

[14]  Thuc Dinh Nguyen,et al.  Gait authentication on mobile phone using biometric cryptosystem and fuzzy commitment scheme , 2015, International Journal of Information Security.

[15]  C. C. van Waveren,et al.  Project Portfolio Management and Enterprise Resource Management: Merging Technologies? , 2012, 2012 Proceedings of PICMET '12: Technology Management for Emerging Technologies.

[16]  Pierre-Jean Charrel,et al.  Eliciting requirements for an inter-company cooperative information system , 2010, J. Syst. Inf. Technol..

[17]  Christophe Rosenberger,et al.  Palm Vein Verification System Based on SIFT Matching , 2009, ICB.

[18]  Masaya Yasuda,et al.  Secure Hamming distance computation for biometrics using ideal-lattice and ring-LWE homomorphic encryption , 2017, Inf. Secur. J. A Glob. Perspect..

[19]  K. Artto,et al.  New value creation in business networks: The role of collective action in constructing system-level goals , 2017 .

[20]  Anil K. Jain,et al.  Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.

[21]  D. Ford,et al.  The theory and practice of business networking , 2013 .

[22]  Miguel Angel Ferrer-Ballester,et al.  Authentication of Individuals using Hand Geometry Biometrics: A Neural Network Approach , 2007, Neural Processing Letters.

[23]  Paul W. P. J. Grefen,et al.  An analysis of web services support for dynamic business process outsourcing , 2006, Inf. Softw. Technol..

[24]  Lei Tian,et al.  Chaotic secure content-based hidden transmission of biometric templates , 2007 .

[25]  Sudeep D. Thepade,et al.  Bimodal biometric identification with Palmprint and Iris traits using fractional coefficients of Walsh, Haar and Kekre transforms , 2015, 2015 International Conference on Communication, Information & Computing Technology (ICCICT).

[26]  Laurel R Jackson,et al.  When business networks "kill" social networks : a case study in Bangladesh , 2016 .

[27]  J. Forrester Industrial Dynamics: A Major Breakthrough for Decision Makers , 2012 .

[28]  Christopher J. Medlin,et al.  Dimensions of space in business network research , 2017 .