CFP last date
20 May 2024
Reseach Article

Cancellable Biometrics for Security and Privacy Enforcement on Semantic Web

by Akhilesh Dwivedi, Suresh Kumar, Abhishek Dwivedi, Manjeet Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 21 - Number 8
Year of Publication: 2011
Authors: Akhilesh Dwivedi, Suresh Kumar, Abhishek Dwivedi, Manjeet Singh
10.5120/2535-3460

Akhilesh Dwivedi, Suresh Kumar, Abhishek Dwivedi, Manjeet Singh . Cancellable Biometrics for Security and Privacy Enforcement on Semantic Web. International Journal of Computer Applications. 21, 8 ( May 2011), 1-8. DOI=10.5120/2535-3460

@article{ 10.5120/2535-3460,
author = { Akhilesh Dwivedi, Suresh Kumar, Abhishek Dwivedi, Manjeet Singh },
title = { Cancellable Biometrics for Security and Privacy Enforcement on Semantic Web },
journal = { International Journal of Computer Applications },
issue_date = { May 2011 },
volume = { 21 },
number = { 8 },
month = { May },
year = { 2011 },
issn = { 0975-8887 },
pages = { 1-8 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume21/number8/2535-3460/ },
doi = { 10.5120/2535-3460 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:07:55.616651+05:30
%A Akhilesh Dwivedi
%A Suresh Kumar
%A Abhishek Dwivedi
%A Manjeet Singh
%T Cancellable Biometrics for Security and Privacy Enforcement on Semantic Web
%J International Journal of Computer Applications
%@ 0975-8887
%V 21
%N 8
%P 1-8
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The entire vision of the Semantic web has nonetheless to be totally accomplished, however there has been considerable progress inside the development and use of standards, languages, technologies and applications. Hence, the Semantic web must be conscious of different types of risks, privacy issues and security issues to stay efficient and secure. Biometric systems provide the answer to confirm that only a legitimate user and nobody else access the rendered services. The safety depends on the secrecy, privacy and trustworthiness of the authenticators because deeper the trust level of authenticator, stronger are going to be security and privacy of Semantic web. Cancellable biometrics and secure sketches have been introduced with the same purpose to guard the privacy of biometric templates to enhance the security and privacy of Semantic Web Services.

References
  1. Thuraisingham B., Parikh P., “Trustworthy Semantic Web Technologies for Secure Knowledge Management”, IEEE/IFIP International Conference on Embedded and Ubiquitous Computing 2008 (EUC '08), Issue Date: 17-20 Dec. 2008.
  2. World Wide Web Consortium, www.w3.org
  3. Fensel, Dieter Andreas, “Ontologies: A Silver Bullet for Knowledge Management and Electronic Commerce” Springer-Verlag, 2002.
  4. O'Gorman L., “Comparing Passwords, Tokens, and Biometrics for User Authentication,” Proceedings of the IEEE, Volume.91 no.12, 2003, pp. 2021 – 2040
  5. B. Lee, J. Handler and Ora Lassila, "The Semantic Web", Scientific American Magazine”, May 17, 2001.
  6. Jain, A.K., Ross, A., Prabhakar, S., "An Introduction to Biometric Recognition", IEEE Trans. on Circuits and Systems for Video Technology, January 2004,Vol. 14, No. 1, pp 4-20
  7. Handler, James, Berners-Lee, Tim and Miller, Eric "Integrating Applications on the Semantic Web," Journal of the Institute of Electrical Engineers of Japan, Volume 122(10), October 2002, p. 676-680.
  8. H. Peter Alesso, Craig F. Smith, “Thinking on the Web: Berners-Lee, Gödel and Turing”, second edition, John Wiley & Sons, Inc., 2010, pp. 177-189., ISBN: 978-81-265-2414-3
  9. Lu Liu, Deyu Kong, Yi Li and Zhe Liu, “An Approach to Enterprise Application Integration Based on Ontology Semantic Description”, Research and Practical Issues of Enterprise Information Systems II, IFIP International Federation for Information Processing, 2008, Volume 255/2008, 977-982, DOI: 10.1007/978-0-387-76312-5_21
  10. Alexander Felfernig, Gerhard Friedrich, Dietmar Jannach, Markus Stumptner and Markus Zanker, “Acquiring Configuration Knowledge Bases in the Semantic Web Using UML”, Knowledge Engineering and Knowledge Management: Ontologies and the Semantic Web, Lecture Notes in Computer Science, 2002, Volume 2473/2002, pp. 141-151, DOI: 10.1007/3-540-45810-7_31
  11. Arash Shaban-Nejad, Christopher J. O. Baker, Volker Haarslev and Greg Butler, “The Fungal Web Ontology: Semantic Web Challenges in Bioinformatics and Genomics”, The Semantic Web – ISWC 2005, Lecture Notes in Computer Science, Springer-Verlag Berlin and Heidelberg GmbH & Co. K, 2005, Volume 3729, pp.1063-1066, DOI: 10.1007/11574620_78
  12. Maedche A., Motik B., Stojanovic L., Studer R., Volz R., “Ontologies for enterprise knowledge management”, Intelligent Systems, IEEE, 2003, Volume: 18 Issue:2, pp. 26 – 33, DOI: 10.1109/MIS.2003.1193654
  13. Oscar Corcho, Silvestre Losada, Richard Benjamins, José Luis Bas and Sergio Bellido, “Personal eBanking Solutions based on Semantic Web Services”, E-Service Intelligence, Studies in Computational Intelligence, 2007, Volume 37,pp. 287-305, DOI: 10.1007/978-3-540-37017-8_13
  14. Wenya Tian and Yuxin Mao, “A Semantic Grid Application for E-Learning Data Sharing”, Advances in Web Based Learning - ICWL 2008, Lecture Notes in Computer Science, 2008, Volume 5145/2008, 457-467, DOI: 10.1007/978-3-540-85033-5_45
  15. Hepp, Martin, “GoodRelations: An Ontology for Describing Products and Services Offers on the Web”, Proceedings of the 16th International Conference on Knowledge Engineering and Knowledge Management (EKAW2008), Acitrezza, Italy, September 29 - October 3, 2008, Springer LNCS, Volume 5268, pp. 332-347.
  16. Umut Uludag, Sharath Pankanti, Salil Prabhakar and Anil K. Jain, “Biometric Cryptosystems: Issues and Challenges”, In Proceedings of IEEE, vol. 92, no. 6, June 2004, 948-960.
  17. Vivian Chu and Gayathri Rajendran, “Use of Biometrics”, TechCast Article Series, the George Washington University, TechCast LLC, 2009
  18. Akhilesh Dwivedi et al “Defending Against Attacks By Enhancing Security Using Biometrics In Semantic Web”, Journal of Global Research in Computer Science, Vol. 2, No 4,2011,pp.17-28.
  19. Ratha, N. K.; Connell, J. H.; Bolle, R. M.; “Enhancing security and privacy in biometrics-based authentication systems” IBM Research Division, IBM Systems Journal, 2001, Volume: 40,no.3, pp. 614 – 634.
  20. RSA, “Securing Your Future with Two-Factor Authentication”, http://www.rsa.com/node.aspx?id=1156 (viewed on 20 April 2011)
  21. Fugkeaw S., Manpanpanich, P., Juntapremjitt, S., “A Robust Single Sign-On Model Based on Multi-Agent System and PKI”, IEEE Sixth International Conference on Networking, 2007, ICN '07, 22-28 April 2007, pp. 101 – 101.
  22. Kumar S., Prajapati R.K., Singh M., De A., “Security Enforcement using PKI in Semantic Web”, International Conference on Computer Information Systems and Industrial Management Applications (CISIM), 2010 ,pp. 392 – 397, Digital Object Identifier: 10.1109/CISIM.2010.5643507
  23. Bhavani Thuraisingham,"Security Issues for the Semantic Web”, Proceedings of the 27th Annual International Computer Software and Applications Conference, COMPSAC-03, IEEE Computer Society,2003,pp.632
  24. Bhavani Thuraisingham, “Confidentiality, Privacy and Trust Policy Enforcement for the Semantic Web”, POLICY '07 Proceedings of the Eighth IEEE International Workshop on Policies for Distributed Systems and Networks, 2007.
  25. Bhavani Thuraisingham, “Confidentiality, Privacy and Trust Policy Enforcement for the Semantic Web”, 8th IEEE International Workshop on- Policy for Distributed System and Network, 2007.
  26. Ravi S. Sandhu, Edward J. Coyne, Hal L. Feinstein, Charles E. Youman, "Role-Based Access Control Models",IEEE Computer, vol. 29, no. 2,Feb. 1996, pp. 38-47.
  27. Andrew B.J. Teoha, Yip Wai Kuan, Sangyoun Lee, “Cancellable biometrics and annotations on BioHash”, Pattern Recognition archive. Volume 41, Issue 6, June 2008, pp. 2034-2044, ISSN: 0031-3203.
  28. K.H. Cheung, A. Kong, D. Zhang, M. Kamel, J. You, Revealing the secret of Face Hashing, ICB 2006, Lecture Notes on Computer Science,vol. 3832, Springer, Berlin. pp. 106–112.
  29. Kong, K.H. Cheung, D. Zhang, M. Kamel, J. You, “An analysis of BioHashing and its variants”, Pattern Recognition 39 (7) (2005) 1359–1368.
  30. B.J. Andrew Teoh, C.L. David Ngo, A. Goh, BioHashing: two factor authentication featuring fingerprint data and tokenised random number, Pattern Recognition 37 (11) (2004) 2245–2255
  31. N. Ratha, J. Connell, R.M. Bolle, Enhancing security and privacy in biometrics-based authentication systems, IBM Syst. J. 40 (3) (2001) 614–634.
  32. R.M. Bolle, J.H. Connel, N.K. Ratha, Biometrics perils and patches, Pattern Recognition 35 (2002) 2727–2738.
  33. B.J. Andrew Teoh, A. Goh, C.L. David Ngo, “Random multispace quantization as an analytic mechanism for BioHashing of biometric and random identity inputs”, IEEE Trans. Pattern Anal. Mach. Intell. 28 (12) (2006) 1892–1901.
  34. C. Soutar, D. Roberge, A.R. Stoianov, Gilroy, B.V.K. Vijaya Kumar, Biometrics encryption, in: R.K. Nichols (Ed.), ICSA Guide to Cryptography, McGraw-Hill, New York, 1999, pp. 649–675.
  35. K. Liu, H. Kargupta, J. Ryan, “Random projection-based multiplicative data perturbation for privacy preserving distributed data mining”, IEEE Trans. Knowl. Data Eng. 18 (1) 2006, pp. 92–106.
Index Terms

Computer Science
Information Sciences

Keywords

Biometrics BioHash Security Privacy Semantic Web Trust