Skip to main content

A Biometric-Based Data Protection Scheme for RSDs

  • Conference paper
  • First Online:
Mobile Internet Security (MobiSec 2023)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 2095))

Included in the following conference series:

  • 166 Accesses

Abstract

Removable Storage Devices are widely used for data storage and sharing in mobile internet. The security of data stored in RSDs is a crucial issue in the field of information security and data protection. Considering that data encryption is ubiquitous for RSDs products, key management has become a challenge. Specially the storing key inside RSDs is not secure if the RSDs are stolen and controlled by attackers. This paper proposes a biometric-based authentication and key management scheme for RSDs data protection with the aim of ensuring that unauthorized users cannot access the plaintext data under any circumstance. Only the legal user with correct biometric features has access to the plaintext data by a client PC. Besides, the performance and security of the proposed scheme are analyzed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Alahmadi, A., Chung, T.S.: Crash recovery techniques for flash storage devices leveraging flash translation layer: a review. Electron. 12(6), 1422 (2023). https://www.mdpi.com/2079-9292/12/6/1422

  2. Cappelli, R., Ferrara, M., Maltoni, D.: Minutia Cylinder-Code: a new representation and matching technique for fingerprint recognition. IEEE Trans. Pattern Anal. Mach. Intell. 32(12), 2128ā€“2141 (2010). https://doi.org/10.1109/TPAMI.2010.52

  3. Dargan, S., Kumar, M.: A comprehensive survey on the biometric recognition systems based on physiological and behavioral modalities. Expert Syst. Appl. 143, 113114 (2020). https://dblp.org/rec/journals/eswa/DarganK20.bib

  4. Deng, J., Guo, J., Ververas, E., Kotsia, I., Zafeiriou, S.: RetinaFace: single-shot multi-level face localisation in the wild. In: Proceedings of the IEEE/CVF Conference on Computer Vision and Patterjin2012fingerprintn Recognition, pp. 5203ā€“5212 (2020). https://openaccess.thecvf.com/content_CVPR_2020/html/Deng_RetinaFace_Single-Shot_Multi-Level_Face_Localisation_in_the_Wild_CVPR_2020_paper.html

  5. Deng, J., Guo, J., Yang, J., Xue, N., Kotsia, I., Zafeiriou, S.: ArcFace: additive angular margin loss for deep face recognition. IEEE Trans. Pattern Anal. Mach. Intell. 44(10), 5962ā€“5979 (2022). https://doi.org/10.1109/TPAMI.2021.3087709

  6. Dyre, S., Sumathi, C.: Hybrid approach to enhancing fingerprint images using filters in the frequency domain. In: 2014 IEEE International Conference on Computational Intelligence and Computing Research, pp. 1ā€“6. IEEE (2014). https://ieeexplore.ieee.org/abstract/document/7238306

  7. Kaur, J., Lamba, S., Saini, P.: Advanced encryption standard: attacks and current research trends. In: 2021 International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE), pp. 112ā€“116. IEEE (2021). https://ieeexplore.ieee.org/abstract/document/9404716

  8. Kumari, A., Bhuiyan, M.Z.A., Namdeo, J., Kanaujia, S., Amin, R., Vollala, S.: Ransomware attack protection: a cryptographic approach. In: Wang, G., Feng, J., Bhuiyan, M.Z.A., Lu, R. (eds.) SpaCCS 2019. LNCS, vol. 11611, pp. 15ā€“25. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-24907-6_2

    Chapter  Google Scholar 

  9. Muttaqin, K., Rahmadoni, J.: Analysis and design of file security system AES (advanced encryption standard) cryptography based. J. Appl. Eng. Technol. Sci. (JAETS) 1(2), 113ā€“123 (2020). https://journal.yrpipku.com/index.php/jaets/article/view/78

  10. Nguyen, K., ProenƧa, H., Alonso-Fernandez, F.: Deep learning for iris recognition: a survey. CoRR abs/2210.05866 (2022). https://doi.org/10.48550/arXiv.2210.05866

  11. Rahmati, M., Alavi, S.R., Ziaei-Rad, S.: Improving the read/write performance of hard disk drives under external excitation sources based on multi-objective optimization. Microsyst. Technol. 23, 3331ā€“3345 (2017). https://dblp.org/rec/conf/cvpr/DengGXZ19.bib

  12. Ranjan, R., Patel, V.M., Chellappa, R.: HyperFace: a deep multi-task learning framework for face detection, landmark localization, pose estimation, and gender recognition. IEEE Trans. Pattern Anal. Mach. Intell. 41(01), 121ā€“135 (2019)

    Article  Google Scholar 

  13. The FIDO Alliance: Fido2. https://fidoalliance.org/fido2/

  14. Tsai, T., Theera-Ampornpunt, N., Bagchi, S.: A study of soft error consequences in hard disk drives. In: IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012), pp. 1ā€“8. IEEE (2012). https://doi.org/10.1109/DSN.2012.6263936

  15. Jea, T.-Y., Govindaraju, V.: A minutia-based partial fingerprint recognition system. Pattern Recogn. 38(10), 1672ā€“1684 (2005). https://doi.org/10.1016/j.patcog.2005.03.016

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yubing Jiang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

Ā© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wu, R., Jiang, Y., Shen, P. (2024). A Biometric-Based Data Protection Scheme for RSDs. In: You, I., Choraś, M., Shin, S., Kim, H., Astillo, P.V. (eds) Mobile Internet Security. MobiSec 2023. Communications in Computer and Information Science, vol 2095. Springer, Singapore. https://doi.org/10.1007/978-981-97-4465-7_21

Download citation

  • DOI: https://doi.org/10.1007/978-981-97-4465-7_21

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-97-4464-0

  • Online ISBN: 978-981-97-4465-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics