“…Thus, electronic payment needs authentication methods that are secure and reliable [9]. Biometrics have been suggested as a replacement for the traditional username/password in electronic payment [10]. Biometrics provide a unique identity which enhance the security and build trust to a greater degree [11].…”
Electronic signature is a quick and convenient tool, used for legal documents and payments since business practices revolutionized from traditional paper-based to computer-based systems. The growing use of electronic signature means they are used in many applications daily, both in government and private organizations such as financial services, where an electronic signature is taken from group of people at once to cash checks or perform a transaction approval. However, non-repudiation and authentication issues remain highlighted concerns for electronic signature. To overcome these obstacles, we propose a TokenSign system that uses revocable fingerprints biotokens with Secret Sharing as electronic signature. TokenSign maintains two layers of security. First, TokenSign scheme transforms and encrypts a user fingerprint data. Second, TokenSign embeds a shared secret inside the encrypted fingerprints. Then, TokenSign Scheme distributes all shares of electronic signatures over multiple clouds. During the matching/signing process, TokenSign utilizes threading to do parallel matching for the fingerprints in its secure encrypted form without decrypting the data. Finally, TokenSign scheme applies Secret Sharing scheme to compute the shared secret, producing an electronic signature. As a result, our experiments show that TokenSign scheme achieves comparable accuracy and improves performance comparing to the two baselines.
“…Thus, electronic payment needs authentication methods that are secure and reliable [9]. Biometrics have been suggested as a replacement for the traditional username/password in electronic payment [10]. Biometrics provide a unique identity which enhance the security and build trust to a greater degree [11].…”
Electronic signature is a quick and convenient tool, used for legal documents and payments since business practices revolutionized from traditional paper-based to computer-based systems. The growing use of electronic signature means they are used in many applications daily, both in government and private organizations such as financial services, where an electronic signature is taken from group of people at once to cash checks or perform a transaction approval. However, non-repudiation and authentication issues remain highlighted concerns for electronic signature. To overcome these obstacles, we propose a TokenSign system that uses revocable fingerprints biotokens with Secret Sharing as electronic signature. TokenSign maintains two layers of security. First, TokenSign scheme transforms and encrypts a user fingerprint data. Second, TokenSign embeds a shared secret inside the encrypted fingerprints. Then, TokenSign Scheme distributes all shares of electronic signatures over multiple clouds. During the matching/signing process, TokenSign utilizes threading to do parallel matching for the fingerprints in its secure encrypted form without decrypting the data. Finally, TokenSign scheme applies Secret Sharing scheme to compute the shared secret, producing an electronic signature. As a result, our experiments show that TokenSign scheme achieves comparable accuracy and improves performance comparing to the two baselines.
“…Biometrics is a new technology that utilises a human's unique physical or behavioural characteristics to authenticate his/her identity (Yun 2003, Clodfelter 2010. There are various modes of biometrics such as fingerprint recognition, iris recognition, facial recognition and hand or two-finger geometry.…”
Section: Introductionmentioning
confidence: 99%
“…Biometric technology and its applications Biometric technology authenticates an individual's identity based on that person's unique physical or behavioural characteristics in lieu of passwords, ID cards or keys (Yun 2003, Clodfelter 2010. Literature review 2.1.…”
Section: Introductionmentioning
confidence: 99%
“…Depending on the specific application area and purpose, a biometric system performs either identification or verification process (Prabhakar et al 2003, Yun 2003, Clodfelter 2010). An identification process involves one-to-many comparisons wherein the database of all registered users is searched for a reference template that matches the newly presented biometric sample.…”
Biometrics is a new technology that authenticates an individual's identity via his or her unique physical or behavioural characteristics, such as the iris, fingerprints, hand geometry, voice and signature. Although its application is becoming pervasive in the public and private sectors due to the potential benefits of the technology, its adoption by end-users is progressing slowly. This study investigates multiple aspects of the benefits and risks that consumers perceive in using biometric technology. A survey was conducted by contacting the actual customers of an American bank that has utilised fingerprint technology at its ATMs. The proposed model was tested with current users as well as potential adopters of the target technology. We found that enjoyment was the most salient perceived benefit for using fingerprint ATMs for both current users and potential adopters. Banks thus may highlight intrinsic values, such as the novelty of biometrics, to motivate the use of the technology. However, to promote potential users' adoption decisions, banks need to educate them about the security benefits of financial transactions under the technology. The result also showed that the current users were highly concerned about information privacy risk in using the fingerprint ATMs. Therefore, banks are advised to develop internal policies to protect personal biometric data from any identity theft or illegal uses to encourage continuous usage by the current users.
“…Where research has considered how people relate to, embrace, or reject, identity management technologies (IMTs) in everyday life (e.g. Byun & Byun, 2013;Clodfelter, 2010;Hossain & Prybutok, 2008;James, Pirim, Boswell, Reithel, & Barkhi, 2006;Sanquist, Mahy, & Morris, 2008;Smith, 2008), it has typically assumed the citizen or the consumer to be a rational actor, making instrumental choices on the basis of perceived usefulness and efficiency. To do so, though, ignores the cultural narratives that precede and interact with the technologies and the ways in which they are understood.…”
A number of national and international agencies have pointed to identity management (IM) as one of the main private and public challenges of the future. The issue is subject to intense public controversy and contestation, especially with respect to access to, usage and ownership of personal data. Most work about IM assumes users to be rational actors making instrumental choices on the basis of perceived usefulness and efficiency; cultural narratives hardly ever come up in current research about acceptance of new identity management technologies (IMTs). Screen representations do not prescribe certain meanings around IM, but create and delineate horizons of imagination; repositories of meanings from which people can draw to make sense of innovations and their consequences. In this paper, we focus on a sample of films, television and web series to examine how IMTs are premediated. Our analysis suggests that a whole range of future IM (knowledge-and token-based, as well as biometric/implant) technologies is imagined here, with biometric and implant technologies most likely to be taken to (dystopian) extremes. Stories of identity theft and confusion, surveillance and control, comfort and corruption construct them as potentially problematic and always under threat, as well as calling up existential concerns about what it means to be human. We conclude that these dark horizons are anchored in myth and persistent fears about who we are, and thus that new means of IM face a difficult task in gaining users' trust.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.