Biometric System Survey of Safety and Confidentiality Issues

Authors

  • Gur Sharan Kant, Kavi Bhushan, Bharat Singh Chittoriya, Rajneesh, Shikha Agarwal, Rakesh Kumar Pandey, Santosh Prasad Singh, Subodh Kumar

Keywords:

intruders, biometric, protocols, identification, cryptography

Abstract

A biometric system is a futuristic system that uses the data about the solitary, previously kept in the record, to identify the difference. Biometric systems are increasingly accepted since they provide security and privacy to the data so that no one can misuse the data. But still, the system is not entirely secure because the pattern can be recognized by a third party with the help of the remote application, like response attacks or realistic detection over the Internet to access the biometric data. This paper presents a survey of security and privacy issues in the biometric system and discusses the various case studies, such as E-passport and, identification, followed by the dangers and problems. So, in this paper, it's mainly concluded that there need to be a few strategies or protocols that might be primarily based totally on sign processing and the cryptography mechanism that might protect the biometric data from intruders. This paper presents a survey of security and privacy issues on the biometric system and discusses the various case studies such as E-passport and Aadhaar identification, followed by the dangers and problems. So, in this paper, it's mainly concluded that there should be a few strategies or protocols that might be primarily based totally on sign processing and the cryptography mechanism that might protect the biometric data from intruders.

Downloads

Download data is not yet available.

References

Jain, A. K., Ross, A., & Prabhakar, S. (2004). An introduction to biometric recognition. IEEE Transactions on Circuits and Systems for Video Technology, 14(1), 4–20. https://doi.org/10.1109/TCSVT.2003.818349.

Liu, S., & Silverman, M. (2001). Practical guide to biometric security technology. IT Professional, 3(1), 27–32. https://doi.org/10.1109/6294.899930.

Bolle, R. M. (2001). Enhancing security. IBM Systems, 40(3), 614–634. https://doi.org/10.1147/sj.403.0614.

Prabhakar, S., Pankanti, S., & Jain, A. K. (2003). Biometric recognition: Security and privacy concerns. IEEE Security & Privacy Magazine, 1(2), 33–42. https://doi.org/10.1109/MSECP.2003.1193209.

Juels, A., Molnar, D., & Wagner, D. (2005). Security and privacy issues in E-passports. Security and privacy for emerging areas in communications networks, 2005. In SecureComm 2005. First International Conference on (pp. 74–88). https://doi.org/10.1109/securecomm.2005.59

Faundez-Zanuy, M. (2006). Biometric security technology. IEEE Aerospace and Electronic Systems Magazine, 21(6), 15–26. https://doi.org/10.1109/MAES.2006.1662038.

Lai, L., Ho, S. W., & Poor, H. V. (2011). Privacy–Security trade-offs in biometric security systems—Part I: Single use case. IEEE Transactions on Information Forensics and Security, 6(1), 122–139. https://doi.org/10.1109/TIFS.2010.2098872.

Huang, X., Xiang, Y., Chonka, A., Zhou, J., & Deng, R. H. (2011). A generic framework for three-factor authentication: Preserving security and privacy in distributed systems. IEEE Transactions on Parallel and Distributed Systems, 22(8), 1390–1397. https://doi.org/10.1109/TPDS.2010.206.

Meng, W., Wong, D. S., Furnell, S., & Zhou, J. (2015). Surveying the development of biometric user authentication on mobile phones. IEEE Communications Surveys and Tutorials, 17(3), 1268–1293. https://doi.org/10.1109/COMST.2014.2386915.

Natgunanathan, I., Mehmood, A., Xiang, Y., Beliakov, G., & Yearwood, J. (2016). Protection of privacy in biometric data. IEEE Access, 4, 880–892. https://doi.org/10.1109/ACCESS.2016.2535120

Memon, N. (2017). How biometric authentication poses new challenges to our secu- rity and privacy [in the spotlight]. IEEE Signal Processing Magazine, 34(4), 194–196. https://doi.org/10.1109/MSP.2017.2697179.

Kumar, T., Braeken, A., Liyanage, M., & Ylianttila, M. (2017). Identity privacy preserving biometric based authentication scheme for Naked healthcare environment. IEEE International Conference on Communications. https://doi.org/10.1109/ICC.2017.7996966.

Jaronde, P. W., Muratkar, N. A., Bhoyar, P. P., Gaikwad, S. J., & Nagrale, R. B. (2018). Review on biometric security system for newborn baby. International Journal of Scientific Research in Science and Technology, 4(2), 907–909.

Osadchy, M., & Dunkelman, O. (2018). It is all in the system’s parameters: Privacy and security issues in transforming biometric raw data into binary strings. IEEE Transactions Depend-able and SecureComputing,5971(c),1–10. https://doi.org/10.1109/TDSC.2018.2804949.

Srivastava, S., Agarwal, N., & Agarwal, R. (2013). Authenticating Indian E-health system through “Aadhaar” A unique identification. International Journal of Scientific & Engineering Research, 4(6), 2412–2416.

Kataria, A. N., Sharma, A. K., & Zaveri, T. H. (2013). A survey of automated biometric authentication techniques (pp. 1–6).

Hemalatha, T., Krishna, D., Krishna, K. B., & Subhramanyam, V. B. (2014). Aadhar based electronic voting system and providing authentication. International Journal of Engineering and Advanced Technology, 4(2), 237–240.

Dixon, P. (2017). A failure to “Do No Harm” – India’s Aadhaar biometric ID program and its inability to protect privacy in relation to measures in Europe and the U.S. Health and Technology, 7(4), 539–567. https://doi.org/10.1007/s12553-017-0202-6.

Wen, F., Susilo, W., & Yang, G. (2015). Analysis and improvement on a biometric-based remote user authentication scheme using smart cards. Wireless Personal Communications, 80(4), 1747–1760. https://doi.org/10.1007/s11277-014-2111-6.

Li, C. T., & Hwang, M. S. (2010). An efficient biometrics-based remote user authentication scheme using smart cards. Journal of Network and Computer Applications, 33(1), 1–5. https://doi.org/10.1016/j.jnca.2009.08.001

Downloads

Published

10.12.2023

How to Cite

Gur Sharan Kant. (2023). Biometric System Survey of Safety and Confidentiality Issues. International Journal of Intelligent Systems and Applications in Engineering, 11(11s), 559 –. Retrieved from https://www.ijisae.org/index.php/IJISAE/article/view/7118

Issue

Section

Research Article