Please use this identifier to cite or link to this item: http://repository.kln.ac.lk/handle/123456789/18998
Title: Mobile Biometrics: The Next Generation Authentication in CloudBased Databases
Authors: Bhatt, C.
Liyanage, S.R.
Keywords: Biometric
Cloud Computing
Information
Mobile
Wireless
Security
Issue Date: 2018
Publisher: 3rd International Conference on Advances in Computing and Technology (ICACT ‒ 2018), Faculty of Computing and Technology, University of Kelaniya, Sri Lanka.
Citation: Bhatt, C. and Liyanage, S.R. (2018). Mobile Biometrics: The Next Generation Authentication in CloudBased Databases. 3rd International Conference on Advances in Computing and Technology (ICACT ‒ 2018), Faculty of Computing and Technology, University of Kelaniya, Sri Lanka. p20.
Abstract: In this period of data innovation, cell phones are generally utilized around the world for fundamental correspondences, as well as an apparatus to manage anyplace, whenever data. These situations require a high security level for individual data and protection assurance through individual distinguishing proof against un-approved use if there should be an occurrence of robbery or fake use in an organized society. At present, the most received technique is the check of Personal Identification Number (PIN), which is risky and won't not be anchored enough to meet this prerequisite. As is represented in a review (Clarke and Furnell, 2005), numerous cell phone clients view the PIN as badly arranged as a secret key that is sufficiently confounded and effortlessly overlooked and not very many clients change their PIN frequently for higher security. Subsequently, it is liked to apply biometrics for the security of cell phones and enhance dependability of remote administrations. As biometrics intends to perceive a man utilizing special highlights of human physiological or conduct attributes, for example, fingerprints, voice, confront, iris, stride and mark, this verification technique normally gives an abnormal state of security. Expectedly, biometrics works with particular gadgets, for instance, infrared camera for securing of iris pictures, increasing speed sensors for step obtaining and depends on expansive scale PC servers to perform ID calculations, which experiences a few issues including massive size, operational many-sided quality and greatly surprising expense. Adding a wireless dimension to biometric identification provides a more efficient and reliable method of identity management across criminal justice and civil markets. Yet deploying cost-effective portable devices with the ability to capture biometric identifiers – such as fingerprints and facial images – is only part of the solution. An end-to-end, standards-based approach is required to deliver operational efficiencies, optimize resources and impact the bottom line. While the use of mobile biometric solutions has evolved in step with the larger biometrics market for some time, the growing ubiquity of smartphones and the rapid and dramatic improvements in their features and performance are accelerating the trend. This is the right time to take a closer look at mobile biometrics and investigate in greater depth how they can be used to their potential. Consolidated with cutting edge detecting stages can identify physiological signals and create different signs, numerous biometric strategies could be executed on phones. This offers an extensive variety of conceivable applications. For example, individual protection assurance, versatile bank exchange benefit security, and telemedicine observation. The utilization of sensor information gathered by cell phones for biometric ID and verification is a rising boondock that must be progressively investigated. We review the state-of-the-art technologies for mobile biometrics in this research.
URI: http://repository.kln.ac.lk/handle/123456789/18998
Appears in Collections:ICACT 2018

Files in This Item:
File Description SizeFormat 
20.pdf281.18 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.