首页    期刊浏览 2025年02月13日 星期四
登录注册

文章基本信息

  • 标题:A SECURE BIOMETRIC BASED APPROACH FOR PROVIDING SECURITY SERVICES IN RESOURCE-AWARE DISTRIBUTED COMPUTING ENVIRONMENT
  • 本地全文:下载
  • 作者:T. HEMALATHA ; G. ATHISHA
  • 期刊名称:Journal of Theoretical and Applied Information Technology
  • 印刷版ISSN:1992-8645
  • 电子版ISSN:1817-3195
  • 出版年度:2014
  • 卷号:62
  • 期号:3
  • 出版社:Journal of Theoretical and Applied
  • 摘要:In recent years there is a need for a security infrastructure for our ubiquitous digital life without using Public key infrastructure and shared session key cryptography algorithms. Since the system scales up, the peer to peer approach is attractive to Distributed Computing Environment due to increase in large amount of resources. The resources in such environment possess different characteristics. The need for security services for such resource restricted environment is a challenging issue. Hence, in this paper a novel algorithm is proposed that uses the macro feature of the fingerprint biometric of the sender and the receiver to generate key(s). The proposed technique provides different security services like Authentication, Non repudiation and Confidentiality. In this work a novel key generation algorithm is proposed to generate unique set of keys by using both sender and receiver�s fingerprint biometrics. These keys are shared between the sender and the receiver by using the underlying concrete S-MIME protocol. Several samples are collected and the macro features are extracted using Finger print feature extraction algorithm. Out of �n� ridges, a ridge is selected and plotted on the x-y axis. Plotting is done as per the sender�s choice. A set of points are selected and the key is generated. The proposed algorithm is implemented in C# DotNet and MATLAB and the results are tested and verified by taking a set of samples. The results of the proposed algorithm are compared with the existing PKI based algorithm with respect to the encryption time, decryption time and memory required.
  • 关键词:Biometric; Finger Print; Key Generation; Security; Ubiquitous
国家哲学社会科学文献中心版权所有