an enhanced high level user authentication and data security using biometric input

P.Kannan,Karthikeyan.P

Published in International Journal of Advanced Research in Computer Science Engineering and Information Technology

ISSN: 2321-3337          Impact Factor:1.521         Volume:1         Issue:2         Year: 12 September,2013         Pages:89-94

International Journal of Advanced Research in Computer Science Engineering and Information Technology

Abstract

The main impact of the project proposal is from the concept of “Getting Biometric input from the user without using any external devices for providing high level user authentication during login”. The purpose of biometric recognition for secure access restricts is to avoid the un-trusted source of interaction.Most cases, object level changes happening in the IT environment is not monitored properly. Considering, a Database Administrator is trying to change an object. In that case, he will change without the knowledge of other DBA’s. In case of accidental changes, or any changes in the system acceptance of the other administrator is important. The system may be prone to hacking vulnerabilities too. To overcome the above issues, we are proposing a standard technique to avoid hacking with the help of Biometric input. Once the user is trying to access the objects to do any changes in the databasethen biometric system will decide the authentication part.

Kewords

Biometric input, Data Base Administrator (DBA), Private key, Public Key, Object Changes

Reference

[1] Carlos Vivaracho-Pascual and Juan Pascual-Gaspar, On the Use of Mobile Phones and Biometrics for Accessing Restricted Web Services,ieee transactions on systems, man, and cybernetics—part c: applications and reviews, vol. 42, no. 2, march 2012. [2] .Q. Tao and R. N. J. Veldhuis, Biometric authentication for a mobile personal device, in Proc. 3rd Annu. Int. Conf. Mobile Ubiquitous Syst.Netw. Serv., Jul. 2006. [3] SidaLin ,QiXie, A secure and efficient mutual authentication protocol using hash function, 2009 International Conference on Communications and Mobile Computing. [4] Andreas Holzinger, Regina Geierhofer, Gig Searle, Biometrical Signatures in Practice: A challenge for improving Human- Computer Interaction in ClinicalWorkflows, Mensch & Computer 2006. [5] F. Alonso-Fernandez, J. Fierrez-Aguilar, J. Ortega-Garcia, and J. Gonzalez-Rodriguez, Secure access system using signature verification over tablet PC, IEEE Aerosp. Electron. Syst. Mag., Apr. 2007. [6] J. M. Pascual-Gaspar, V. Carde˜nosoPayo, and C. E. Vivaracho- Pascual, Practical on-line signature verification” in Proc. 3rd Int. Conf.Adv. Biometr. Berlin, Heidelberg, Germany: Springer-Verlag, 2009. [7] N. L. Clarke and S. M. Furnell, Advanced user authentication for mobile devices, Comput. Secur., vol. 26, no. 2, pp. 109–119, 2007. [8] Enhancing security for the mobile workforce, Biometric Technol. Today,vol. 16, no. 1, pp. 8–8, 2008. [9] Sarker, M.Z.H, Parvez, M.S, A Cost effective symmetric key cryptographic algorithm for small amount of data, 9th International Multitopic Conference, IEEE INMIC 2005. [10] Sharafat, A.R, ;Dept of Electr. &Comput. Eng., Waterloo Univ., Tahvildari, L., A Probabilistic approach to predict changes in object-oriented software systems. Software maintainance and Reengineering, 2007. CSMR ’07. 11th European Conference