Abstract
Of course, in all world countries, commercial and industrial enterprises play an important role in the development of their economics. Recently, the change in enterprise operation mode, such as their activities speed in terms of production and transport, requires integration of these activities into a private and/or public networks structure in order to achieve many benefits such as the time and the cost. So, for an effective development, these enterprises must be connected with them in order to exchange necessary information. Thus, the resultant of this leads to emergence of special structure, called Enterprises Network (EN), which allows such enterprise to more effectively interact with others enterprises inside and outside their activities. The challenges that oppose this structure are the concerns of transmitted data security which are exchanged between them as well as the privacy issues, which ensure the secrecy of enterprise information. In contrast with other approaches presented in literature, a complete biometric cryptosystem is presented. Based on the obtained results, it can be inferred that the proposed authentication system is highly secure, effective and cheap, which are vital for any authentication system to gain enterprise confidence for implementation in real time secure access control systems.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Forrester JW (1958) Industrial dynamics: a major breakthrough for decision makers. Harv Bus Rev 36(4):37–66
Bendjenna H, Zarour N, Charrel PJ (2010) Eliciting requirements for an inter-company cooperative information system. J Syst Inf Technol 12(4):303–335
Ford D, Mouzas S (2013) The theory and practice of business networking. Ind Mark Manag 42(3):433–442
Benade SJ, van Waveren CC (2012) Technology management for emerging technologies. In: Technology management for emerging technologies proceedings of PICMET ’12, pp 2395–2404
Amroune M, Inglebert JM, Zarour N, Charrel PJ (2011) AspeCis: an aspect-oriented approach to develop a cooperative information system. In: Bellatreche L, Mota Pinto F (eds) Model and data engineering. MEDI 2011. Lecture notes in computer science, vol 6918. Springer, Berlin, Heidelberg
Andersen KV, Debenham JK, Wagner R (eds) (2005) How to design a loose inter-organizational workflow: an illustrative case study. In: Lecture notes in computer science, vol 3588. Springer
Grefen PWPJ, Ludwig H, Dan A, Angelov S (2006) An analysis of web services support for dynamic business process outsourcing. Inf Softw Technol 48(11):1115–1134
Grefen PWPJ, Mehandjiev N, Kouvas G, Weichhart G, Eshuis R (2009) Dynamic business network process management in instant virtual enterprises. Comput Ind 60(2):86–103
Jackson L, Young L (2016) When business networks “kill” social networks: a case study in Bangladesh. Ind Mark Manag 58:148–161
Matinheikki J, Pesonen T, Artto K, Peltokorpi A (2017) New value creation in business networks: the role of collective action in constructing system-level goals. Ind Mark Manag
Törnroos JÅ, Halinen A, Medlin CJ (2017) Dimensions of space in business network research. Ind Mark Manag 61:10–19
Park KH, Favrel J (1999) Virtual enterprise-Information system and networking solution. Comput Ind Eng 37(1–2):441–444
Godbole N, Belapure S (2011) Cyber security: understanding cyber crimes, computer forensic and legal perspective, 1st edn. Wiley India Pvt Ltd
Matthews R (1989) On the derivation of a “chaotic” encryption algorithm. Cryptologia 13(1):29–42
Schneier B (1996) Applied cryptography: protocols, algorithms and source code, C, 2nd ed. Wiley
Meraoumia A, Kadri F, Chitrob S, Bouridane A (2014) Improving biometric identification performance using PCANet deep learning & multispectral palmprint. In: Book of biometric security and privacy-opportunities & challenges in the big data Era. Published by Springer, pp 51–69
Faundez-Zanuy M, Elizondo DA, Ferrer-Ballester MA, Travieso-González CM (2007) Authentication of individuals using hand geometry biometrics: a neural network approach. Neural Process Lett 26(3):201–216
Khan MK, Zhang J, Tian L (2007) Chaotic secure content-based hidden transmission of biometrics templates. Chaos Solitons Fractals 32:1749–1759
Uludag U, Pankanti S, Prabhakar S (2004) Biometrics cryptosystems: issues and challenges. Proc IEEE 92(6):948–960
Failla P, Sutcu Y, Barni M (2010) Esketch: a privacy-preserving fuzzy commitment scheme for authentication using encrypted biometrics. In: Proceedings of the 12th ACM workshop on multimedia and security, pp 241–246
Hoang T, Choi D, Nguyen T (2015) Gait authentication on mobile phone using biometric cryptosystem and fuzzy commitment scheme. Int J Inf Secur 14(6):1–12
Charfi N, Trichili H, Alimi A, Solaiman B (2015) Personal recognition system using hand modality based on local features. In: 11th international conference on information assurance and security (IAS2015), pp 13–17
Kumar A, Wong DCM, Shen HC, Jain AK (2003) Personal verification using palmprint and hand geometry biometric. In: Proceedings of the 4th international conference on audio-and video-based biometric person authentication, pp 668–678
Ladoux P, Rosenberger C, Dorizzi B (2009) Palm vein verification system based on sift matching. In: 3rd international conference ICB, pp 1290–1298
Wang WC, Chen WS, Shih SW (2009) Biometric recognition by fusing palmprint and hand-geometry based on morphology. In: Proceedings of the IEEE international conference on acoustics, speech and signal processing, pp 893–896
Choras M (2007) Image feature extraction methods for Ear biometrics. In: University of technology & life sciences, Bydgoszcz. Computer information systems and industrial management applications. IEEE Explore, pp 28–30
Wang X, Lei L, Wang M (2012) Palmprint verification based on 2D-Gabor wavelet and pulse-coupled neural network. Knowl-Based Syst 27:451–455
Yasuda M (2017) Secure Hamming distance computation for biometrics using ideal-lattice and ring-LWE homomorphic encryption. J Inf Secur Glob Perspect 26(2):85–103
PolyU. database. http://www4.comp.polyu.edu.hk/~biometrics/
Thepade SD, Bhondave RK (2015) Bimodal biometric identification with palmprint and Iris Traits using Fractiona coefficients of Walsh, Haar and Kekre transforms. In: International conference on communication, information and computing technology (ICCICT), Mumbai, India
Meraoumia A, Chitroub S, Bendjenna H, Bouridane A (2016) An automated finger-knuckle-print identification system using jointly RBF & RFT classifiers. In: 15th international conference on ubiquitous computing and communications and international symposium on cyberspace and security (IUCC-CSS), Granada, Spain, pp 17–22
Acknowledgements
The authors are grateful to the anonymous referees for their valuable and helpful comments. This research has been carried out within the CNEPRU project (Grant: B*02920-140028) of the Department of mathematics and computer sciences, University of Laarbi Tebessi. The authors thank Miss. Wissal Bouakal for her valuable help as well as staff of LAMIS laboratory for helpful comments and suggestions.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer International Publishing AG, part of Springer Nature
About this chapter
Cite this chapter
Meraoumia, A., Bendjenna, H., Dris, Y., Amroune, M. (2019). Enhancing Security and Privacy in Enterprises Network by Using Biometrics Technologies. In: Patnaik, S., Yang, XS., Tavana, M., Popentiu-Vlădicescu, F., Qiao, F. (eds) Digital Business. Lecture Notes on Data Engineering and Communications Technologies, vol 21. Springer, Cham. https://doi.org/10.1007/978-3-319-93940-7_8
Download citation
DOI: https://doi.org/10.1007/978-3-319-93940-7_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-93939-1
Online ISBN: 978-3-319-93940-7
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)