“…Now, fingerprint verification (Hanene et al , 2013), face verification (Bianco, 2016), pupil verification (Villalobos-Castaldi et al , 2013) and other biometric verification become more and more mature, and most of them have been applied to user authentication. As a result, user identity authentication can be divided into single factor authentication (such as password, smart card, dynamic password and biometrics) and multifactor authentication (Bhargav-Spantzel et al , 2010) that combines multiple single factor authentications together to strengthen the security of user identity authentication.- Access control , through user permission definition and authorization, can ensure that only the users with legal rights can access the authorized data in the system, while unauthorized users cannot access the data (Zamite et al , 2013; Stefano et al , 2015). Access control is one of the basic security means of a database system, which can be divided into two categories, i.e.
…”