Skip to main content

From Biometry to Signature-As-A-Service: The Idea, Architecture and Realization

  • Conference paper
  • First Online:
Artificial Intelligence and Soft Computing (ICAISC 2016)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 9693))

Included in the following conference series:

  • 1176 Accesses

Abstract

The purpose of this article is to discuss the motivation and benefits of developing and releasing a cloud service providing digital signature in software and infrastructure as-a-service model. Additionally, since users authorization and authentication is based on biometry (analyzing the blood vessels system) the end user doesnt have to be equipped with any additional smart-cards or devices for storing the private key and performing crypto-operations, and the only what he needs to digitally sign data, files or documents is a web browser and his finger. Podpiszpalcem.pl is the service realizing the above idea and is presented in this paper.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ballad, B., Ballad, T., Banks, E.: Access Control, Authentication, and Public Key Infrastructure, 1st edn. Jones & Bartlett, Boston (2010)

    Google Scholar 

  2. Bement, A.L.: Security requirements for cryptographic modules. Information Technology Laboratory, National Institute of Standards and Technology (2001)

    Google Scholar 

  3. Bhattacharyya, D., Ranjan, R., Alisherov, A., Choi, M.: Biometric authentication: a review. Int. J. u- e- Serv Sci. Technol. 2(3), 13–28 (2009)

    Google Scholar 

  4. Boulgouris, N.V., Plataniotis, K.N., Micheli-Tzanakou, E.: Biometrics: Theory, Methods, and Applications. IEEE Press Series on Computational Intelligence, 1st edn. Wiley-IEEE Press, New York (2009)

    Book  MATH  Google Scholar 

  5. Chapman, M.R.: SaaS Enterpreneur: The definite guide to success in your cloud application business, Softletter (2012)

    Google Scholar 

  6. Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Trans. Infor. Theor. 22(6), 644–654 (1976)

    Article  MathSciNet  MATH  Google Scholar 

  7. Heseltine, T., Pears, N., Austin, J., Chen, Z., Recognition, F.: A Comparison of Appearance-Based approaches. In: Sun C., Talbot, H., Ourselin, S., Adriaansen, T. (eds.) Proceedings of VIIth Digital Image Computing: Techniques and Applications, Sydney, 10–12 December 2003 (2003)

    Google Scholar 

  8. Himaga, M., Kou, K.: Finger vein authentication technology and financial applications. In: Ratha, N.K., Govindaraju, V. (eds.) Advances in Biometrics. Springer, London (2008)

    Google Scholar 

  9. Huang B., Dai Y., Li R., Tang W., Li W., Finger-vein authentication based on wide line detector and pattern normalization. In: International Conference on Pattern Recognition (2010)

    Google Scholar 

  10. Jain, A.K., Ross, A.A., Nandakumar, K.: Introduction to Biometrics, 1st edn. Springer, USA (2011)

    Book  Google Scholar 

  11. McGrath, M.P.: Understanding PaaS. OReilly Media, Sebastopol (2012)

    Google Scholar 

  12. Menezes A.J., van Oorschot P.C., Vanstone S.A.: Handbook of Applied Cryptography. Edycja V (2005)

    Google Scholar 

  13. Mitnick, K.D., Simon, W.L., Wozniak, S.: The Art of Deception Controlling the Human Element of Security. Wiley Publishing, Indianapolis (2002)

    Google Scholar 

  14. Orthacker, C., Centner, M., Kittl, C.: Qualified mobile server signature. In: Rannenberg, K., Varadharajan, V., Weber, C. (eds.) Security and Privacy Silver Linings in the Cloud. IFIP Advances in Information and Communication Technology. Springer, Heidelberg (2010)

    Google Scholar 

  15. Schneier, B.: Applied cryptography, 2nd edn. John Wiley and Sons, New York (1996)

    MATH  Google Scholar 

  16. Vacca, J.R., Infrastructure, P.K.: Public Key Infrastructure: Building Trusted Applications and Web Services, 1st edn. Auerbach Publications, Boca Raton (2004)

    Book  Google Scholar 

  17. Rzecki, K., Siwik, L., Wojnarowicz, J.: Selected environments implementing the public key infrastructure. In: International Conference on Information Security in Computer Systems (2003)

    Google Scholar 

  18. Rzecki, K., Siwik, L.: Certification authority in linux system. In: 4th Conference: Computermethods and Systems in Scientific Research and Engineering Design (MSK) (2003)

    Google Scholar 

  19. Siwik, L., Mozgowoj, L.: Server-side encrypting and digital signature platform with biometric authorization. Int. J. Comput. Netw. Inf. Secur. 7(4), 57–64 (2015)

    Google Scholar 

Download references

Acknowledgments

The research presented in this paper was partially supported by the AGH University of Science and Technology Statutory Fund no. 11.11.230.124 and by research project UDA-POIG.01.04.00-12-041/11-00; i.e.: “The server-side digital signature platform with biometric authorization - bioPKI".

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Leszek Siwik .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Siwik, L., Mozgowoj, L., Rzecki, K. (2016). From Biometry to Signature-As-A-Service: The Idea, Architecture and Realization. In: Rutkowski, L., Korytkowski, M., Scherer, R., Tadeusiewicz, R., Zadeh, L., Zurada, J. (eds) Artificial Intelligence and Soft Computing. ICAISC 2016. Lecture Notes in Computer Science(), vol 9693. Springer, Cham. https://doi.org/10.1007/978-3-319-39384-1_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-39384-1_18

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-39383-4

  • Online ISBN: 978-3-319-39384-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics