Improvement of Digest Based Authentication Scheme for Biometric Verification

Normally, authenticating a system in an untrusted environment is performed through mechanisms such as identification card, password checking and etc. However, by the development of technology, cracking such systems through forging password or stealing identification card may be done leading to the lack of security and hence privacy. This is why biometric based authentication systems are appropriate offer to provide security of clients. Through such systems, clients are verified and permitted to login to the system according to their physical or behavioral traits. Biometric systems offer several advantages over traditional authentication methods. Moreover, these systems, protects the privacy of clients, confidentiality and integrity of critical information for emerging technology such as smartphones and other appliances. In this paper, we improved our previous biometric authentication system and through some practical scenarios, we considered different attacks from client, server, and network sides to intrude into the privacy. We mathematically proved that our scheme is indistinguishable and prevents the attacker to threat legitimate individuals' information and privacy. Finally, we showed our computation and memory efficiency compared with related studies.

[1]  Mürvet Kirci,et al.  A digest-based method for efficiency improvement of security in biometrical cryptography authentication , 2017, 2017 International Symposium on Computer Science and Software Engineering Conference (CSSE).

[2]  Julien Bringer,et al.  Privacy-Preserving Biometric Identification Using Secure Multiparty Computation: An Overview and Recent Trends , 2013, IEEE Signal Processing Magazine.

[3]  Arjan Kuijper,et al.  Privacy Protection of Biometric Templates , 2014, HCI.

[4]  Stark C. Draper,et al.  Secure Biometrics: Concepts, Authentication Architectures, and Challenges , 2013, IEEE Signal Processing Magazine.

[5]  Prakash Kuppuswamy,et al.  Implementation of Biometric Security usingHybrid Combination of RSA and SimpleSymmetric Key Algorithm , 2013 .

[6]  Vincenzo Conti,et al.  Fingerprint Traits and RSA Algorithm Fusion Technique , 2012, 2012 Sixth International Conference on Complex, Intelligent, and Software Intensive Systems.

[7]  Arun Ross,et al.  A survey on ear biometrics , 2013, CSUR.

[8]  Faezeh Sadat Babamir,et al.  Dynamic digest based authentication for client-server systems using biometric verification , 2019, Future Gener. Comput. Syst..

[9]  Nalini K. Ratha,et al.  Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..

[10]  Bart Preneel,et al.  Privacy-Preserving Multibiometric Authentication in Cloud with Untrusted Database Providers , 2018, IACR Cryptol. ePrint Arch..

[11]  Christoph Busch,et al.  Multi-Biometric Template Protection: Issues and Challenges , 2012 .

[12]  Anil K. Jain,et al.  Biometric Template Protection: Bridging the performance gap between theory and practice , 2015, IEEE Signal Processing Magazine.