Ali, Zulfiqar and Hossain, M Shamim and Muhammad, Ghulam and Ullah, Ihsan and Abachi, Hamid and Alamri, Atif (2018) Edge-centric multimodal authentication system using encrypted biometric templates. Future Generation Computer Systems, 85. pp. 76-87. DOI https://doi.org/10.1016/j.future.2018.02.040
Ali, Zulfiqar and Hossain, M Shamim and Muhammad, Ghulam and Ullah, Ihsan and Abachi, Hamid and Alamri, Atif (2018) Edge-centric multimodal authentication system using encrypted biometric templates. Future Generation Computer Systems, 85. pp. 76-87. DOI https://doi.org/10.1016/j.future.2018.02.040
Ali, Zulfiqar and Hossain, M Shamim and Muhammad, Ghulam and Ullah, Ihsan and Abachi, Hamid and Alamri, Atif (2018) Edge-centric multimodal authentication system using encrypted biometric templates. Future Generation Computer Systems, 85. pp. 76-87. DOI https://doi.org/10.1016/j.future.2018.02.040
Abstract
Data security, complete system control, and missed storage and computing opportunities in personal portable devices are some of the major limitations of the centralized cloud environment. Among these limitations, security is a prime concern due to potential unauthorized access to private data. Biometrics, in particular, is considered sensitive data, and its usage is subject to the privacy protection law. To address this issue, a multimodal authentication system using encrypted biometrics for the edge-centric cloud environment is proposed in this study. Personal portable devices are utilized for encrypting biometrics in the proposed system, which optimizes the use of resources and tackles another limitation of the cloud environment. Biometrics is encrypted using a new method. In the proposed system, the edges transmit the encrypted speech and face for processing in the cloud. The cloud then decrypts the biometrics and performs authentication to confirm the identity of an individual. The model for speech authentication is based on two types of features, namely, Mel-frequency cepstral coefficients and perceptual linear prediction coefficients. The model for face authentication is implemented by determining the eigenfaces. The final decision about the identity of a user is based on majority voting. Experimental results show that the new encryption method can reliably hide the identity of an individual and accurately decrypt the biometrics, which is vital for errorless authentication.
Item Type: | Article |
---|---|
Uncontrolled Keywords: | Cloud computing; Privacy protection; Biometric templates; Encryption; Chaotic system; ORL database |
Divisions: | Faculty of Science and Health Faculty of Science and Health > Computer Science and Electronic Engineering, School of |
SWORD Depositor: | Unnamed user with email elements@essex.ac.uk |
Depositing User: | Unnamed user with email elements@essex.ac.uk |
Date Deposited: | 29 Apr 2020 08:30 |
Last Modified: | 16 May 2024 20:17 |
URI: | http://repository.essex.ac.uk/id/eprint/27387 |
Available files
Filename: Edge_Centric_accpeted.pdf
Licence: Creative Commons: Attribution-Noncommercial-No Derivative Works 3.0