CFP last date
20 May 2024
Reseach Article

Four-Factor based Privacy Preserving Biometric Authentication and Authorization Scheme for Enhancing Grid Security

by G. Jaspher Willsie Kathrine, E. Kirubakaran
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 30 - Number 5
Year of Publication: 2011
Authors: G. Jaspher Willsie Kathrine, E. Kirubakaran
10.5120/3639-5083

G. Jaspher Willsie Kathrine, E. Kirubakaran . Four-Factor based Privacy Preserving Biometric Authentication and Authorization Scheme for Enhancing Grid Security. International Journal of Computer Applications. 30, 5 ( September 2011), 13-20. DOI=10.5120/3639-5083

@article{ 10.5120/3639-5083,
author = { G. Jaspher Willsie Kathrine, E. Kirubakaran },
title = { Four-Factor based Privacy Preserving Biometric Authentication and Authorization Scheme for Enhancing Grid Security },
journal = { International Journal of Computer Applications },
issue_date = { September 2011 },
volume = { 30 },
number = { 5 },
month = { September },
year = { 2011 },
issn = { 0975-8887 },
pages = { 13-20 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume30/number5/3639-5083/ },
doi = { 10.5120/3639-5083 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:16:10.093033+05:30
%A G. Jaspher Willsie Kathrine
%A E. Kirubakaran
%T Four-Factor based Privacy Preserving Biometric Authentication and Authorization Scheme for Enhancing Grid Security
%J International Journal of Computer Applications
%@ 0975-8887
%V 30
%N 5
%P 13-20
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Increase in the data sharing of distributed data has resulted in resource usage being more and more distributed. The distributed nature of data and its need to be accessed has resulted in the grid environment. Authentication is considered as the first step of security requirement for any grid environment against potential threats. This paper proposes an authentication method which is based not only on the password and the user ID but also on the biometric input and the position of the user. By enhancing the security at the entry point of Virtual Organization (VO), the grid environment is secured in its first step. The same biometric and position data used for authentication can further be used for authorization purposes so as to reduce the cost and time of storing different data for different purposes. A Four-Factor based Privacy Preserving Biometric (4F2PB) authentication scheme for a grid environment is proposed which can work on the existing Network Framework. The proposed authentication scheme optimises the security required for the entry level user and prevents malicious user from entering into the grid environment.

References
  1. Ian Foster, “What is the Grid? A Three Point Checklist”, 2002.
  2. Foster, C. Kesselman, S. Tuecke, “The anatomy of the grid: enabling scalable virtual organizations”, Int. J. High Performance Computing, 2001.
  3. Quan Zhou, Geng Yang, Jiangang Shen, Chunming Rong, “A Scalable Architecture for Grid”, Sixth International Conference on Parallel and Distributed Computing, Applications and Technologies, 2005.
  4. Bendahmane, M. Essaaidi, A. El Moussaoui, A. Younes, “Grid Computing Security Mechanisms: State-of-The-Art”, International Conference on Multimedia Computing and systems ICMS ’09, pp535-540, 2009.
  5. http://www.globus.org/toolkit/docs/4.0/security/GT4-GSI-Overview.pdf
  6. Lamport. L., “Password Authentication with insecure Communication”, ACM Communications 24(11), 770-772, 1981.
  7. Hwang.T, Chen.Y, Laih. C. S, “Non-Interactive password authentication without password tables”, IEEE Conference on Computer and Communication Systems, pp. 429-431.
  8. J.K.Lee, S.R.Ryu and K.Y.Yoo, “Fingerprint-based remote user authentication scheme using smart cards”, Electron. Lett., vol.38, no.12, pp.554-555, 2002.
  9. C.C.Chang and I.C.Lin, “Remarks on fingerprint-based remote user authentication scheme using smart cards”, ACM SIGOPS operating System Rev., vol.38,no.4, pp. 91-96, 2004.
  10. C.H.Lin and Y.Y.Lai, “A flexible biometrics remote user authentication scheme”, Computer Standards Interfaces, vol.27, no.1, pp.19-23, 2004.
  11. U. Uludag, S. Pankanti, S. Prabhakar, and A. K. Jain, “Biometric cryptosystems: Issues and challenges,” Proc. IEEE, Special Issue on Multimedia Security for Digital Rights Management, vol. 92, no. 6, pp. 948–960, Jun. 2004.
  12. Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith, “Fuzzy extractors: How to generate strong keys from biometrics and other noisy data”, in Eurocrypt 2004, pp. 523–540.
  13. A. Juels and M. Wattenberg, “A fuzzy commitment scheme”, in Proc. ACMConf. Computer and Communications Security, 1999, pp. 28–36.
  14. Y. Sutcu, Q. Li, and N. Memon, “Protecting biometric templates with sketch: Theory and practice”, IEEE Trans. Inf. Forensics Security, vol. 2, no. 3, pp. 503–512, Sep. 2007.
  15. C.M. Chen and W.C. Ku, “Stolen-verifier attack on two new strong-password authentication protocol”, IEICE transactions on Communications, E85-B (11), 20002, pp. 2519-2521.
  16. Chun-I Fan and Yi-Hui Lin, “Provably secure remote Truly Three-Factor Authentication Scheme with Privacy Protection on Biometrics”, IEEE Transactions on information Forensic and Security, vol. 4, No.4, December 2009.
  17. http://blog.dustintrammell.com/2008/11/21/four-factor-authentication
  18. http://www.ogf.org/documents/GFD.80.pdf
  19. Gong. L, “Security risk of depending on synchronized clocks”, ACM Operating System Review”, ACM Operating System Review. 26(1), pp. 49-53.
  20. Xiong Li, Jian-Wei Niu, Jian Ma, Wen-Dong Wang, Cheng-Lian Liu, “Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards”, Journal of Network and Computer Applications 34 (2011) pp.73-79.
  21. Li C-T, Hwang M-S,” An Efficient biometrics-based remote user authentication scheme using smart cards”, Journal of Network and Computer Applications, 2010, 33(1) pp. 1-5.
  22. Ferraiolo D F, Sandhu R, Gavrila S, “Proposed NIST standard for role-based access control. ACM Transactions on Information and System Security”, 2001, 4(3): 224 – 274.
  23. Bechara Al Bouna , Richard Chbeir , Stefania Marrara, “Enforcing role based access control model with multimedia signatures”, Journal of Systems Architecture 55 (2009) 264–274.
Index Terms

Computer Science
Information Sciences

Keywords

Grid Computing Authentication Virtual Organisation Biometric Data