2018
DOI: 10.1049/iet-bmt.2018.5101
|View full text |Cite
|
Sign up to set email alerts
|

Privacy preserving biometric‐based remote authentication with secure processing unit on untrusted server

Abstract: Biometric-based authentication systems offer undeniable benefits to users. However, biometric features are vulnerable to attacks, especially those happening over transmission network or at the stored biometric templates. In this work, we propose a novel biometric-based remote authentication framework to deal with malicious attacks over the transmission channel and at the untrusted server. More concretely, the proposed framework is not only resistant against attacks on the network but also protects biometric te… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
5
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
5
3

Relationship

2
6

Authors

Journals

citations
Cited by 13 publications
(5 citation statements)
references
References 30 publications
0
5
0
Order By: Relevance
“…They also provide metadata about masking data to the framework to run the anonymization algorithms. Based on the provided policies, the framework executes different algorithms and models (such as k-anonymity, l-diversity, t-closeness) to the dataset and measure the risk as well as the utility of the outputs [48,49]. This process is iterated multiple times, using heuristics to find the optimal result.…”
Section: Discussion and Future Workmentioning
confidence: 99%
“…They also provide metadata about masking data to the framework to run the anonymization algorithms. Based on the provided policies, the framework executes different algorithms and models (such as k-anonymity, l-diversity, t-closeness) to the dataset and measure the risk as well as the utility of the outputs [48,49]. This process is iterated multiple times, using heuristics to find the optimal result.…”
Section: Discussion and Future Workmentioning
confidence: 99%
“…Future work will create a large set of data that works on the modified protocol. In addition, the association of the authentication process and the different kinds of privacy protection [29,30] are possibilities to support to extend the security capabilities of our protocol, especially with resource-constrained IoT devices. In [31], for example, the authors proposed a scenario related to our protocol that applies cryptographic-based protocol to satisfy desired security requirements of electronic voting and protect privacy, so we can extend the security of the proposed protocol to improve its practical value.…”
Section: Discussionmentioning
confidence: 99%
“…The number of incoming objects according some defined parameters with ∆max_friend = 7 (a) ∆reputation =[10,30], (b) ∆ reputation = 80…”
mentioning
confidence: 99%
“…Another recent methodology that deals with the untrusted server issue was presented in [17]. In that research, a biometric-based authentication framework was proposed to secure biometric features during transmissions and at untrusted servers.…”
Section: Related Workmentioning
confidence: 99%