2018
DOI: 10.1016/j.future.2018.02.040
|View full text |Cite
|
Sign up to set email alerts
|

Edge-centric multimodal authentication system using encrypted biometric templates

Abstract: Data security, complete system control, and missed storage and computing opportunities in personal portable devices are some of the major limitations of the centralized cloud environment. Among these limitations, security is a prime concern due to potential unauthorized access to private data. Biometrics, in particular, is considered sensitive data, and its usage is subject to the privacy protection law. To address this issue, a multimodal authentication system using encrypted biometrics for the edge-centric c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
27
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
3
3

Relationship

2
8

Authors

Journals

citations
Cited by 62 publications
(27 citation statements)
references
References 45 publications
0
27
0
Order By: Relevance
“…Recent advancements in decentralized data transactions via Blockchain [5], [11], IoT [12], MEC and Fog Computing [2], [7], [30] and 5G device-to-device (D2D) communication capability [27] will allow secure sharing economy services wherein any number of entities within a mass crowd, such as in a smart city, can perform a multiparty transaction in a decentralized manner [6], [7], [24], [25]. For example, recent medical equipment, such as CT Scan machine, has embedded IoT devices that enable data processing locally and upload the results to Blockchain and off-chain nodes running at the nearby edge [3], [7], [9], [22], [24], [28], [31]. Two parties can securely perform any online activity or financial or business transaction [3], [13], [26], [37].…”
Section: Related Studymentioning
confidence: 99%
“…Recent advancements in decentralized data transactions via Blockchain [5], [11], IoT [12], MEC and Fog Computing [2], [7], [30] and 5G device-to-device (D2D) communication capability [27] will allow secure sharing economy services wherein any number of entities within a mass crowd, such as in a smart city, can perform a multiparty transaction in a decentralized manner [6], [7], [24], [25]. For example, recent medical equipment, such as CT Scan machine, has embedded IoT devices that enable data processing locally and upload the results to Blockchain and off-chain nodes running at the nearby edge [3], [7], [9], [22], [24], [28], [31]. Two parties can securely perform any online activity or financial or business transaction [3], [13], [26], [37].…”
Section: Related Studymentioning
confidence: 99%
“…In this paper [23],the authors have proposed a privacy preserving biometric system with data encrypted and stored in the database located in the cloud. The correctness of the identification system is achieved first and secondly the privacy of very sensitive biometric information and secret values of keys is captured and preserved confidentially.…”
Section: Fig 5:an Illustration Of Banking Verification System [6]mentioning
confidence: 99%
“…The researchers argue in [26] the suitability of signature based authentication systems for the IoT devices whereby they presented three categories of signature based scheme namely, offline, online and behaviour. Some Gait recognition based authentication systems proposed for IoT devices are also in the literature [27]. A touch screen based authentication scheme is proposed in [28].…”
Section: Related Workmentioning
confidence: 99%