Abstract
The purpose of this article is to discuss the motivation and benefits of developing and releasing a cloud service providing digital signature in software and infrastructure as-a-service model. Additionally, since users authorization and authentication is based on biometry (analyzing the blood vessels system) the end user doesnt have to be equipped with any additional smart-cards or devices for storing the private key and performing crypto-operations, and the only what he needs to digitally sign data, files or documents is a web browser and his finger. Podpiszpalcem.pl is the service realizing the above idea and is presented in this paper.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ballad, B., Ballad, T., Banks, E.: Access Control, Authentication, and Public Key Infrastructure, 1st edn. Jones & Bartlett, Boston (2010)
Bement, A.L.: Security requirements for cryptographic modules. Information Technology Laboratory, National Institute of Standards and Technology (2001)
Bhattacharyya, D., Ranjan, R., Alisherov, A., Choi, M.: Biometric authentication: a review. Int. J. u- e- Serv Sci. Technol. 2(3), 13–28 (2009)
Boulgouris, N.V., Plataniotis, K.N., Micheli-Tzanakou, E.: Biometrics: Theory, Methods, and Applications. IEEE Press Series on Computational Intelligence, 1st edn. Wiley-IEEE Press, New York (2009)
Chapman, M.R.: SaaS Enterpreneur: The definite guide to success in your cloud application business, Softletter (2012)
Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Trans. Infor. Theor. 22(6), 644–654 (1976)
Heseltine, T., Pears, N., Austin, J., Chen, Z., Recognition, F.: A Comparison of Appearance-Based approaches. In: Sun C., Talbot, H., Ourselin, S., Adriaansen, T. (eds.) Proceedings of VIIth Digital Image Computing: Techniques and Applications, Sydney, 10–12 December 2003 (2003)
Himaga, M., Kou, K.: Finger vein authentication technology and financial applications. In: Ratha, N.K., Govindaraju, V. (eds.) Advances in Biometrics. Springer, London (2008)
Huang B., Dai Y., Li R., Tang W., Li W., Finger-vein authentication based on wide line detector and pattern normalization. In: International Conference on Pattern Recognition (2010)
Jain, A.K., Ross, A.A., Nandakumar, K.: Introduction to Biometrics, 1st edn. Springer, USA (2011)
McGrath, M.P.: Understanding PaaS. OReilly Media, Sebastopol (2012)
Menezes A.J., van Oorschot P.C., Vanstone S.A.: Handbook of Applied Cryptography. Edycja V (2005)
Mitnick, K.D., Simon, W.L., Wozniak, S.: The Art of Deception Controlling the Human Element of Security. Wiley Publishing, Indianapolis (2002)
Orthacker, C., Centner, M., Kittl, C.: Qualified mobile server signature. In: Rannenberg, K., Varadharajan, V., Weber, C. (eds.) Security and Privacy Silver Linings in the Cloud. IFIP Advances in Information and Communication Technology. Springer, Heidelberg (2010)
Schneier, B.: Applied cryptography, 2nd edn. John Wiley and Sons, New York (1996)
Vacca, J.R., Infrastructure, P.K.: Public Key Infrastructure: Building Trusted Applications and Web Services, 1st edn. Auerbach Publications, Boca Raton (2004)
Rzecki, K., Siwik, L., Wojnarowicz, J.: Selected environments implementing the public key infrastructure. In: International Conference on Information Security in Computer Systems (2003)
Rzecki, K., Siwik, L.: Certification authority in linux system. In: 4th Conference: Computermethods and Systems in Scientific Research and Engineering Design (MSK) (2003)
Siwik, L., Mozgowoj, L.: Server-side encrypting and digital signature platform with biometric authorization. Int. J. Comput. Netw. Inf. Secur. 7(4), 57–64 (2015)
Acknowledgments
The research presented in this paper was partially supported by the AGH University of Science and Technology Statutory Fund no. 11.11.230.124 and by research project UDA-POIG.01.04.00-12-041/11-00; i.e.: “The server-side digital signature platform with biometric authorization - bioPKI".
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Siwik, L., Mozgowoj, L., Rzecki, K. (2016). From Biometry to Signature-As-A-Service: The Idea, Architecture and Realization. In: Rutkowski, L., Korytkowski, M., Scherer, R., Tadeusiewicz, R., Zadeh, L., Zurada, J. (eds) Artificial Intelligence and Soft Computing. ICAISC 2016. Lecture Notes in Computer Science(), vol 9693. Springer, Cham. https://doi.org/10.1007/978-3-319-39384-1_18
Download citation
DOI: https://doi.org/10.1007/978-3-319-39384-1_18
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-39383-4
Online ISBN: 978-3-319-39384-1
eBook Packages: Computer ScienceComputer Science (R0)