Advertisement

Multimodal Biometrics and Multilayered IDM for Secure Authentication

  • Abdullah Rashed
  • Henrique Santos
Part of the Communications in Computer and Information Science book series (CCIS, volume 92)

Abstract

In the Electronic Society (e-world) users are represented by a set of data called Digital Identity (ID), which they must use for authentication purposes. Within the e-world it is certainly risky to lose the identity and this security threat must be ranking with the highest priority, forcing a solution that provides an amenable usage of digital identity. Efficient protection of the digital identity would also encourage users to enter the digital world without worries. Security needs to provide the necessary identity management (IDM) process to mitigate that threat. This paper gives an overview of IDM and suggests a framework that can be particularly useful for a secure user authentication. The proposed model appears as a multi-layered security approach, since it tries to integrate different security technologies and multimodal biometrics tools and practices, such as police, procedures, guidelines, standards and legislation. The advantages, limitations and requirements of the proposed model are discussed.

Keywords

security digital identity management privacy authentication biometrics 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Ross, A., Jain, A.: Multimodal Biometrics: An Overview. In: Proceedings of 12th European Signal Processing Conference (EUSIPCO), Vienna, Austria, pp. 1221–1224 (2004)Google Scholar
  2. 2.
    Rashed, A.: Intelligent Encryption Decryption Systems Using Genetic Algorithms, Ph.D. Dissertation, Arab Academy, Amman, Jordan (2004)Google Scholar
  3. 3.
    Squicciarini, A., Czeskis Bhargav-Spantzel, A.: Privacy policies compliance across digital identity anagement systems. In: SPRINGL 2008, pp. 72–81 (2008)Google Scholar
  4. 4.
    Lakshmi, B., Kannammal, A.: Secured Authentication of Space Specified Token with Biometric Traits – Face and Fingerprint. IJCSNS International Journal of Computer Science and Network Security 9(7) (2009)Google Scholar
  5. 5.
    Cisco Systems, Inc., Intel: Five Myths of Wireless Networks (2006), http://www.ciscosystems.lt/en/US/.../prod_white_paper0900aecd805287fc.pdf
  6. 6.
    Birch, D.: Digital Identity Management. Gower (2007) ISBN: 978-0-566-08679-3Google Scholar
  7. 7.
    Taylor, D.S.: Multi-Layered Approach to Small Office Networking, the SANS Institute Reading Room site (2001), www.sans.org/../hsoffice/multilayered_approach_to_small_office_networking_624
  8. 8.
    Arcieri, F., Ciclosi, M., Dimitr, A., Fioravanti, F., Nardelli, E., Talamo, M.: The Italian Electronic Identity Card: Overall Architecture and IT infrastructure. In: 2nd International Workshop on Certification and Security in Inter-Organizational E-Services (CSES 2004), Toulouse, France. IFIP Conference Proceedings, vol. 306, pp. 5–18 (2000)Google Scholar
  9. 9.
    Ahn, G., Lam, J.: Managing Privacy Preferences for Federated Identity Management, Workshop On Digital Identity Management. In: Proceedings of the 2005 Workshop on Digital Identity Management, Fairfax, VA, USA, SESSION: Privacy protection, pp. 28–36 (2005)Google Scholar
  10. 10.
    Gomi, H., Fujita, S.: A Delegation Framework for Federated Identity Management. In: Proceedings of the 2005 Workshop on Digital Identity Management, pp. 94–103 (2005)Google Scholar
  11. 11.
    Leitold, H., Hollosi, A., Posch, R.: Security Architecture of the Austrian Citizen Card Concept. In: 18th Annual Computer Security Applications Conference, San Diego, California, December 09 - 13, pp. 391–403 (2002)Google Scholar
  12. 12.
    Camenisch, J., Abhi, S., Sommer, D., Fischer-Hübner, S., Hansen, M., Krasemann, H., Lacoste, G., Leenes, R., Tseng, J.: Privacy and Identity Management for Everyone. In: Proceedings of the 2005 workshop on Digital Identity Management. Fairfax, VA, USA, SESSION: Privacy protection, pp. 20–27 (2005)Google Scholar
  13. 13.
    Zhou, J., Chin, W., Roman, R., Lopez, J.: An Effective Multi-layered Defense Framework Against Spam. Information Security Technical Report 12(3), 179–185 (2007)CrossRefGoogle Scholar
  14. 14.
    Casassa Mont, M., Thyne, R.: Privacy policy Enforcement in Enterprises with Identity Management Solutions. In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services. SESSION: Privacy technologies, Markham, Ontario, Canada, vol. 380, Article No. 25 (2006)Google Scholar
  15. 15.
    Goodrich, M., Tamassia, R., Yao, D.: Notarized Federated Identity Management for Web Services. In: DBSec 2006, p. 133 (2006)Google Scholar
  16. 16.
    Khan, M.K., Zhang, J.: Multimodal Face and Fingerprint Biometrics Authentication on Space-Limited Tokens. Neurocomputing 71(13-15), 3026–3031 (2006)CrossRefGoogle Scholar
  17. 17.
    Rundle, M., Ben Laurie, B.: Identity Management as a Cybersecurity Case Ctudy. In: Oxford Internet Institute Conference – Safety and Security in a Networked World: Balancing Cyber-Rights and Responsibilities, Research Publication No. 2006-01. The Berkman Center for Internet & Society Research Publication Series (September 2005), http://cyber.law.harvard.edu/publications
  18. 18.
    Madsen, P., Koga, Y., Takahashi, K.: Federated Identity Management for Protecting Users from ID Theft. In: Proceedings of the 2005 Workshop on Digital Identity Management, Fairfax, VA, USA, pp. 77–83 (2005)Google Scholar
  19. 19.
    Clauβ, S., Kesdogan, D., Klsch, T.: Privacy Enhancing Identity Management: Protection Against Re-Identification and Profiling. In: Proceedings of the 2005 workshop on Digital identity management. SESSION: DIM frameworks, Fairfax, VA, USA, pp. 84–93 (2005) ISBN:1-59593-232-1Google Scholar
  20. 20.
    Candebat, T., Gray, D.: Secure Pseudonym Management Using Mediated Identity-based Encryption. Journal of Computer Security 14(3), 249–267 (2006)Google Scholar
  21. 21.
    Gayathri, T., Venkadajothi, S., Kalaivani, S., Divya, C., Dhas, S., Sakunthala, R.: Mobile Multilayer IPsec Protocol. International Journal of Engineering and Technology 1(1), 23–29 (2009)Google Scholar
  22. 22.
    Wikipedia website, Identity Management Dimensions, http://www.en.wikipedia.org
  23. 23.
    Beres, Y., Baldwin, A., Casassa, M., Mont Shiu, S.: On Identity Assurance in the Presence of federated Identity Management Systems. Digital Identity Management, 27–35 (2007)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2010

Authors and Affiliations

  • Abdullah Rashed
    • 1
  • Henrique Santos
    • 1
  1. 1.R & D Centre of AlgoritmiUniversity of MinhoGuimarãesPortugal

Personalised recommendations