Advertisement

Enhancing Security and Privacy in Enterprises Network by Using Biometrics Technologies

  • Abdallah Meraoumia
  • Hakim BendjennaEmail author
  • Yahia Dris
  • Mohamed Amroune
Chapter
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 21)

Abstract

Of course, in all world countries, commercial and industrial enterprises play an important role in the development of their economics. Recently, the change in enterprise operation mode, such as their activities speed in terms of production and transport, requires integration of these activities into a private and/or public networks structure in order to achieve many benefits such as the time and the cost. So, for an effective development, these enterprises must be connected with them in order to exchange necessary information. Thus, the resultant of this leads to emergence of special structure, called Enterprises Network (EN), which allows such enterprise to more effectively interact with others enterprises inside and outside their activities. The challenges that oppose this structure are the concerns of transmitted data security which are exchanged between them as well as the privacy issues, which ensure the secrecy of enterprise information. In contrast with other approaches presented in literature, a complete biometric cryptosystem is presented. Based on the obtained results, it can be inferred that the proposed authentication system is highly secure, effective and cheap, which are vital for any authentication system to gain enterprise confidence for implementation in real time secure access control systems.

Notes

Acknowledgements

The authors are grateful to the anonymous referees for their valuable and helpful comments. This research has been carried out within the CNEPRU project (Grant: B*02920-140028) of the Department of mathematics and computer sciences, University of Laarbi Tebessi. The authors thank Miss. Wissal Bouakal for her valuable help as well as staff of LAMIS laboratory for helpful comments and suggestions.

References

  1. 1.
    Forrester JW (1958) Industrial dynamics: a major breakthrough for decision makers. Harv Bus Rev 36(4):37–66Google Scholar
  2. 2.
    Bendjenna H, Zarour N, Charrel PJ (2010) Eliciting requirements for an inter-company cooperative information system. J Syst Inf Technol 12(4):303–335Google Scholar
  3. 3.
    Ford D, Mouzas S (2013) The theory and practice of business networking. Ind Mark Manag 42(3):433–442CrossRefGoogle Scholar
  4. 4.
    Benade SJ, van Waveren CC (2012) Technology management for emerging technologies. In: Technology management for emerging technologies proceedings of PICMET ’12, pp 2395–2404Google Scholar
  5. 5.
    Amroune M, Inglebert JM, Zarour N, Charrel PJ (2011) AspeCis: an aspect-oriented approach to develop a cooperative information system. In: Bellatreche L, Mota Pinto F (eds) Model and data engineering. MEDI 2011. Lecture notes in computer science, vol 6918. Springer, Berlin, HeidelbergCrossRefGoogle Scholar
  6. 6.
    Andersen KV, Debenham JK, Wagner R (eds) (2005) How to design a loose inter-organizational workflow: an illustrative case study. In: Lecture notes in computer science, vol 3588. SpringerGoogle Scholar
  7. 7.
    Grefen PWPJ, Ludwig H, Dan A, Angelov S (2006) An analysis of web services support for dynamic business process outsourcing. Inf Softw Technol 48(11):1115–1134CrossRefGoogle Scholar
  8. 8.
    Grefen PWPJ, Mehandjiev N, Kouvas G, Weichhart G, Eshuis R (2009) Dynamic business network process management in instant virtual enterprises. Comput Ind 60(2):86–103CrossRefGoogle Scholar
  9. 9.
    Jackson L, Young L (2016) When business networks “kill” social networks: a case study in Bangladesh. Ind Mark Manag 58:148–161CrossRefGoogle Scholar
  10. 10.
    Matinheikki J, Pesonen T, Artto K, Peltokorpi A (2017) New value creation in business networks: the role of collective action in constructing system-level goals. Ind Mark ManagCrossRefGoogle Scholar
  11. 11.
    Törnroos JÅ, Halinen A, Medlin CJ (2017) Dimensions of space in business network research. Ind Mark Manag 61:10–19CrossRefGoogle Scholar
  12. 12.
    Park KH, Favrel J (1999) Virtual enterprise-Information system and networking solution. Comput Ind Eng 37(1–2):441–444CrossRefGoogle Scholar
  13. 13.
    Godbole N, Belapure S (2011) Cyber security: understanding cyber crimes, computer forensic and legal perspective, 1st edn. Wiley India Pvt LtdGoogle Scholar
  14. 14.
    Matthews R (1989) On the derivation of a “chaotic” encryption algorithm. Cryptologia 13(1):29–42MathSciNetCrossRefGoogle Scholar
  15. 15.
    Schneier B (1996) Applied cryptography: protocols, algorithms and source code, C, 2nd ed. WileyGoogle Scholar
  16. 16.
    Meraoumia A, Kadri F, Chitrob S, Bouridane A (2014) Improving biometric identification performance using PCANet deep learning & multispectral palmprint. In: Book of biometric security and privacy-opportunities & challenges in the big data Era. Published by Springer, pp 51–69Google Scholar
  17. 17.
    Faundez-Zanuy M, Elizondo DA, Ferrer-Ballester MA, Travieso-González CM (2007) Authentication of individuals using hand geometry biometrics: a neural network approach. Neural Process Lett 26(3):201–216CrossRefGoogle Scholar
  18. 18.
    Khan MK, Zhang J, Tian L (2007) Chaotic secure content-based hidden transmission of biometrics templates. Chaos Solitons Fractals 32:1749–1759CrossRefGoogle Scholar
  19. 19.
    Uludag U, Pankanti S, Prabhakar S (2004) Biometrics cryptosystems: issues and challenges. Proc IEEE 92(6):948–960CrossRefGoogle Scholar
  20. 20.
    Failla P, Sutcu Y, Barni M (2010) Esketch: a privacy-preserving fuzzy commitment scheme for authentication using encrypted biometrics. In: Proceedings of the 12th ACM workshop on multimedia and security, pp 241–246Google Scholar
  21. 21.
    Hoang T, Choi D, Nguyen T (2015) Gait authentication on mobile phone using biometric cryptosystem and fuzzy commitment scheme. Int J Inf Secur 14(6):1–12CrossRefGoogle Scholar
  22. 22.
    Charfi N, Trichili H, Alimi A, Solaiman B (2015) Personal recognition system using hand modality based on local features. In: 11th international conference on information assurance and security (IAS2015), pp 13–17Google Scholar
  23. 23.
    Kumar A, Wong DCM, Shen HC, Jain AK (2003) Personal verification using palmprint and hand geometry biometric. In: Proceedings of the 4th international conference on audio-and video-based biometric person authentication, pp 668–678Google Scholar
  24. 24.
    Ladoux P, Rosenberger C, Dorizzi B (2009) Palm vein verification system based on sift matching. In: 3rd international conference ICB, pp 1290–1298CrossRefGoogle Scholar
  25. 25.
    Wang WC, Chen WS, Shih SW (2009) Biometric recognition by fusing palmprint and hand-geometry based on morphology. In: Proceedings of the IEEE international conference on acoustics, speech and signal processing, pp 893–896Google Scholar
  26. 26.
    Choras M (2007) Image feature extraction methods for Ear biometrics. In: University of technology & life sciences, Bydgoszcz. Computer information systems and industrial management applications. IEEE Explore, pp 28–30Google Scholar
  27. 27.
    Wang X, Lei L, Wang M (2012) Palmprint verification based on 2D-Gabor wavelet and pulse-coupled neural network. Knowl-Based Syst 27:451–455CrossRefGoogle Scholar
  28. 28.
    Yasuda M (2017) Secure Hamming distance computation for biometrics using ideal-lattice and ring-LWE homomorphic encryption. J Inf Secur Glob Perspect 26(2):85–103CrossRefGoogle Scholar
  29. 29.
  30. 30.
    Thepade SD, Bhondave RK (2015) Bimodal biometric identification with palmprint and Iris Traits using Fractiona coefficients of Walsh, Haar and Kekre transforms. In: International conference on communication, information and computing technology (ICCICT), Mumbai, IndiaGoogle Scholar
  31. 31.
    Meraoumia A, Chitroub S, Bendjenna H, Bouridane A (2016) An automated finger-knuckle-print identification system using jointly RBF & RFT classifiers. In: 15th international conference on ubiquitous computing and communications and international symposium on cyberspace and security (IUCC-CSS), Granada, Spain, pp 17–22Google Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2019

Authors and Affiliations

  • Abdallah Meraoumia
    • 1
  • Hakim Bendjenna
    • 1
    Email author
  • Yahia Dris
    • 2
  • Mohamed Amroune
    • 1
  1. 1.LAboratory of Mathematics, Informatics and Systems (LAMIS)University of TebessaTébessaAlgeria
  2. 2.Management Sciences DepartmentUniversity of TebessaTébessaAlgeria

Personalised recommendations