ABSTRACT
Biometric technologies are being considered lately for student identity management in Higher Education Institutions, as they provide several advantages over the traditional knowledge-based and token-based authentication methods, i.e., biometrics provide high security entropies, convenience and a sense of technological modernity to the end-users. While biometric technologies have many benefits from both a security and usability point of view, still there is a need for innovative user identity management solutions that continuously identify and authenticate students during academic and teaching activities. In addition, biometrics entail several threats and weaknesses with regards to the privacy of data stored about the user, which negatively affect the user acceptance and the wider adoption of biometrics due to regulatory and legal issues. In this paper, we refer to our ongoing research on intelligent and continuous online student identity management for improving security and trust in European Higher Education Institutions. We further highlight based on the literature, existing challenges, threats and state-of-the-art approaches with regards to preserving the privacy of biometric-driven data.
- Mare, S., Baker, M., Gummeson, J. (2016). A Study of Authentication in Daily Life. In Proc. SOUPS 2016, 189-206Google Scholar
- Ometov, A., Bezzateev, S., Maekitalo, N., Andreev, S., Mikkonen, T., Koucheryavy, Y. (2020). Multi-Factor Authentication: A Survey. Cryptography, 2(1), 1Google ScholarCross Ref
- Constantinides, A., Fidas, C., Belk, M., Pietron, A., Han, T., Pitsillides, A. (2021). From Hot-spots towards Experience-spots: Leveraging on Users’ Sociocultural Experiences to Enhance Security in Cued-recall Graphical Authentication. International Journal of Human-Computer Studies, 149Google Scholar
- Gonzalez-Manzano, L., De Fuentes, J., Ribagorda, A. (2019). Leveraging User-related Internet of Things for Continuous Authentication: A Survey. ACM Computing Surveys, 52(3), article 53, 38 pagesGoogle ScholarDigital Library
- Buschek, D., De Luca, A., Alt, F. (2015). Improving Accuracy, Applicability and Usability of Keystroke Biometrics on Mobile Touchscreen Devices. In Proc. ACM CHI 2015, 1393-1402Google ScholarDigital Library
- Rouhani, S., Deters, R. (2019). Blockchain Based Access Control Systems: State of the Art and Challenges. ACM Web Intelligence, 423-428Google Scholar
- Jain, A.K., Nandakumar, K., Ross, A. (2016). 50 Years of Biometric Research: Accomplishments, Challenges, and Opportunities. Pattern Recognition Letters, 79, 80-105Google ScholarDigital Library
- Rui, Z., Yan, Z. (2018). A Survey on Biometric Authentication: Toward Secure and Privacy-Preserving Identification. IEEE Access, 7, 5994-6009Google ScholarCross Ref
- Bhalla, A. (2020). The Latest Evolution of Biometrics. Biometric Technology Today, 2020 (8), 5-8Google ScholarCross Ref
- Gray, S.L. (2017). Biometrics in Schools: The Role of Authentic and Inauthentic Social Transactions. BSA Conference 2017Google Scholar
- Pagnin, E., Mitrokotsa, A. (2017). Privacy-Preserving Biometric Authentication: Challenges and Directions. Security and Communication Networks, 2017, 7129505Google ScholarCross Ref
- Labati, R.D., Genovese, A., Muñoz, E., Piuri, V., Scotti, F., Sforza, G. (2016). Biometric Recognition in Automated Border Control: A Survey. ACM Computing Surveys, 49(2), Article 24, 39 pagesGoogle Scholar
- Belhumeur, P.N., Hespanha, J.P., Kriegman, D.J. (1997). Eigenfaces vs. Fisherfaces: Recognition using Class Specific Linear Projection. IEEE Transactions on Pattern Analysis and Machine Intelligence, 19(7), 711-720Google ScholarDigital Library
- Guo, G., Zhang, N. (2019). A Survey on Deep Learning based Face Recognition. Computer Vision and Image Understanding, 189, 102805Google ScholarDigital Library
- Schroff, F., Kalenichenko, D., Philbin, J. (2015). Facenet: A Unified Embedding for Face Recognition and Clustering. IEEE Conference on Computer Vision and Pattern Recognition, 815-823Google Scholar
- Constantinides, A., Belk, M., Fidas, C., Pitsillides, A. (2020). An Eye Gaze-driven Metric for Estimating the Strength of Graphical Passwords based on Image Hotspots. ACM Intelligent User Interfaces (IUI 2020), ACM Press, 33-37Google Scholar
- Constantinides, A., Belk, M., Fidas, C., Pitsillides, A. (2019). On the Accuracy of Eye Gaze-driven Classifiers for Predicting Image Content Familiarity in Graphical Passwords. ACM User Modeling, Adaptation and Personalization (UMAP 2019), ACM Press, 245-249Google Scholar
- Boles, A., Rad, P. (2017). Voice Biometrics: Deep Learning-based Voiceprint Authentication System. System of Systems Engineering Conference, IEEE, 1-6Google Scholar
- Nagrani, A., Chung, J.S., Xie, W., Zisserman, A. (2020). Voxceleb: Large-scale Speaker Verification in the Wild. Computer Speech & Language, 60, 101027Google ScholarDigital Library
- Ravanelli, M., Bengio, Y. (2018). Speaker Recognition from Raw Waveform with Sincnet. IEEE Spoken Language Technology Workshop, IEEE, 1021-1028Google ScholarCross Ref
- Belk, M., Portugal, D., Christodoulou, E., Samaras, G. (2015). Cognimouse: On Detecting Users’ Task Completion Difficulty through Computer Mouse Interaction. ACM Conference Extended Abstracts on Human Factors in Computing Systems, 1019-1024Google Scholar
- Zhang, R., Xue, R., Liu, L. (2019). Security and Privacy on Blockchain. ACM Computing Surveys, 52(3), article 51Google Scholar
- Tran, Q.N., Turnbull, B.P., Wu, H., de Silva, A., Kormusheva, K., Hu, J, (2021). A Survey on Privacy-Preserving Blockchain Systems (PPBS) and a Novel PPBS-Based Framework for Smart Agriculture. IEEE Open Journal of the Computer Society, 2, 72-84Google ScholarCross Ref
- Sarier, N.D. (2018). Privacy Preserving Biometric Identification on the Bitcoin Blockchain. International Symposium on Cyberspace Safety and Security (CSS 2018), 254-269Google Scholar
- Tran, Q.N., Turnbull, B.P., Hu, J. (2021). Biometrics and Privacy-Preservation: How Do They Evolve? IEEE Open Journal of the Computer Society, 2, 179-191Google ScholarCross Ref
Index Terms
- Privacy-preserving Biometric-driven Data for Student Identity Management: Challenges and Approaches
Recommendations
A privacy-preserving cancelable iris template generation scheme using decimal encoding and look-up table mapping
Biometric-based recognition systems have overcome passive issues of traditional human authentication systems. However, security theft and privacy invasion are two passive issues that still persist in the effective deployment of biometric-based ...
Efficient yet robust biometric iris matching on smart cards for data high security and privacy
Smart control access to any service and/or critical data is at the very basis of any smart project. Biometrics have been used as a solution for system access control, for many years now. However, the simple use of biometrics cannot be considered as ...
Biometrics-based identifiers for digital identity management
IDTRUST '10: Proceedings of the 9th Symposium on Identity and Trust on the InternetWe present algorithms to reliably generate biometric identifiers from a user's biometric image which in turn is used for identity verification possibly in conjunction with cryptographic keys. The biometric identifier generation algorithms employ image ...
Comments