Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Development of secured algorithm to enhance the privacy and security template of biometric technology

View through CrossRef
The security of information and personal privacy are the growing concerns in today’s human life worldwide. The storage of biometric data in the database has raised the prospect of compromising the database leading to grave risks and misuse of the person’s privacy such as growth in terrorism and identity fraud. When a person’s biometric data stored is revealed, their security and privacy are being compromised. This research described a detailed evaluation on several outbreaks and threats associated with the biometric technology. It analyzed the user’s fear and intimidations to the biometric technology alongside the protection steps for securing the biometric data template in the database. It is known that, when somebody’s biometric data template is compromised from the database that consequently might indicate proof of identity robbery of that person. Mixed method to compute and articulate the results as well as a new tactic of encryption-decryption algorithm with a design pattern of Model View Template (MVT) are used for securing the biometric data template in the database. The model managed information logically, the view indicated the visualization of the data, and the template directed the data migration into pattern object. Factors influencing fear of biometric technology such as an exposer of personal information, improper data transfer, and data misuse are found. Strong knowledge of the ideal technology like the private skills of the biometric technology, data secrecy and perceived helpfulness are established. The fears and attacks along the technology like a counterfeit of documents and brute-force attack are known. The designed algorithm based on the cryptographic module of the Fernet keys instance are utilized. The Fernet keys are combined to generate a multiFernet key, integrated with biometric data to produce two encrypted files (byte and text file). These files are incorporated with Twilio message and firmly stored in the database. The storage database has security measures that guard against an impostor’s attack. The database system can block the attacker from unauthorized access. Thus, significantly increased individual data privacy and integrity.
The Nelson Mandela African Institution of Science and Technology
Title: Development of secured algorithm to enhance the privacy and security template of biometric technology
Description:
The security of information and personal privacy are the growing concerns in today’s human life worldwide.
The storage of biometric data in the database has raised the prospect of compromising the database leading to grave risks and misuse of the person’s privacy such as growth in terrorism and identity fraud.
When a person’s biometric data stored is revealed, their security and privacy are being compromised.
This research described a detailed evaluation on several outbreaks and threats associated with the biometric technology.
It analyzed the user’s fear and intimidations to the biometric technology alongside the protection steps for securing the biometric data template in the database.
It is known that, when somebody’s biometric data template is compromised from the database that consequently might indicate proof of identity robbery of that person.
Mixed method to compute and articulate the results as well as a new tactic of encryption-decryption algorithm with a design pattern of Model View Template (MVT) are used for securing the biometric data template in the database.
The model managed information logically, the view indicated the visualization of the data, and the template directed the data migration into pattern object.
Factors influencing fear of biometric technology such as an exposer of personal information, improper data transfer, and data misuse are found.
Strong knowledge of the ideal technology like the private skills of the biometric technology, data secrecy and perceived helpfulness are established.
The fears and attacks along the technology like a counterfeit of documents and brute-force attack are known.
The designed algorithm based on the cryptographic module of the Fernet keys instance are utilized.
The Fernet keys are combined to generate a multiFernet key, integrated with biometric data to produce two encrypted files (byte and text file).
These files are incorporated with Twilio message and firmly stored in the database.
The storage database has security measures that guard against an impostor’s attack.
The database system can block the attacker from unauthorized access.
Thus, significantly increased individual data privacy and integrity.

Related Results

Privacy and Security for Digital Health: Assessing Risks and Harms to Users
Privacy and Security for Digital Health: Assessing Risks and Harms to Users
Electronic Health (e-Health), such as mobile health (mHealth) and Health Information Systems (HIS), benefits healthcare consumers and professionals. However, it also poses potentia...
THE SECURITY AND PRIVACY MEASURING SYSTEM FOR THE INTERNET OF THINGS DEVICES
THE SECURITY AND PRIVACY MEASURING SYSTEM FOR THE INTERNET OF THINGS DEVICES
The purpose of the article: elimination of the gap in existing need in the set of clear and objective security and privacy metrics for the IoT devices users and manufacturers and a...
Optimizing Secure Selective Face Template Generation Exchange over Open Network
Optimizing Secure Selective Face Template Generation Exchange over Open Network
Abstract Many modern authentication systems utilize human biometrics instead of traditional passwords and security codes to overcome their limitations. To enhance s...
Key binding biometrics‐based remote user authentication scheme using smart cards
Key binding biometrics‐based remote user authentication scheme using smart cards
Remote user authentication schemes using smart cards provide solutions for securing user authentication. The schemes rely on passwords or biometric or both, which fall apart if the...
A Novel Multimodal Biometric Person Authentication System Based on ECG and Iris Data
A Novel Multimodal Biometric Person Authentication System Based on ECG and Iris Data
Existing security issues like keys, pins, and passwords employed presently in almost all the fields that have certain limitations like passwords and pins can be easily forgotten; k...
Augmented Differential Privacy Framework for Data Analytics
Augmented Differential Privacy Framework for Data Analytics
Abstract Differential privacy has emerged as a popular privacy framework for providing privacy preserving noisy query answers based on statistical properties of databases. ...
Multimodal Image Fusion in Biometric Authentication
Multimodal Image Fusion in Biometric Authentication
During this study, a unique multimodal biometric system was constructed. This system incorporated a variety of unimodal biometric inputs, including fingerprints, palmprints, knuckl...

Back to Top