Skip to main content

Enhancing Security and Privacy in Enterprises Network by Using Biometrics Technologies

  • Chapter
  • First Online:
Digital Business

Part of the book series: Lecture Notes on Data Engineering and Communications Technologies ((LNDECT,volume 21))

  • 1011 Accesses

Abstract

Of course, in all world countries, commercial and industrial enterprises play an important role in the development of their economics. Recently, the change in enterprise operation mode, such as their activities speed in terms of production and transport, requires integration of these activities into a private and/or public networks structure in order to achieve many benefits such as the time and the cost. So, for an effective development, these enterprises must be connected with them in order to exchange necessary information. Thus, the resultant of this leads to emergence of special structure, called Enterprises Network (EN), which allows such enterprise to more effectively interact with others enterprises inside and outside their activities. The challenges that oppose this structure are the concerns of transmitted data security which are exchanged between them as well as the privacy issues, which ensure the secrecy of enterprise information. In contrast with other approaches presented in literature, a complete biometric cryptosystem is presented. Based on the obtained results, it can be inferred that the proposed authentication system is highly secure, effective and cheap, which are vital for any authentication system to gain enterprise confidence for implementation in real time secure access control systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 119.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 159.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Forrester JW (1958) Industrial dynamics: a major breakthrough for decision makers. Harv Bus Rev 36(4):37–66

    Google Scholar 

  2. Bendjenna H, Zarour N, Charrel PJ (2010) Eliciting requirements for an inter-company cooperative information system. J Syst Inf Technol 12(4):303–335

    Google Scholar 

  3. Ford D, Mouzas S (2013) The theory and practice of business networking. Ind Mark Manag 42(3):433–442

    Article  Google Scholar 

  4. Benade SJ, van Waveren CC (2012) Technology management for emerging technologies. In: Technology management for emerging technologies proceedings of PICMET ’12, pp 2395–2404

    Google Scholar 

  5. Amroune M, Inglebert JM, Zarour N, Charrel PJ (2011) AspeCis: an aspect-oriented approach to develop a cooperative information system. In: Bellatreche L, Mota Pinto F (eds) Model and data engineering. MEDI 2011. Lecture notes in computer science, vol 6918. Springer, Berlin, Heidelberg

    Chapter  Google Scholar 

  6. Andersen KV, Debenham JK, Wagner R (eds) (2005) How to design a loose inter-organizational workflow: an illustrative case study. In: Lecture notes in computer science, vol 3588. Springer

    Google Scholar 

  7. Grefen PWPJ, Ludwig H, Dan A, Angelov S (2006) An analysis of web services support for dynamic business process outsourcing. Inf Softw Technol 48(11):1115–1134

    Article  Google Scholar 

  8. Grefen PWPJ, Mehandjiev N, Kouvas G, Weichhart G, Eshuis R (2009) Dynamic business network process management in instant virtual enterprises. Comput Ind 60(2):86–103

    Article  Google Scholar 

  9. Jackson L, Young L (2016) When business networks “kill” social networks: a case study in Bangladesh. Ind Mark Manag 58:148–161

    Article  Google Scholar 

  10. Matinheikki J, Pesonen T, Artto K, Peltokorpi A (2017) New value creation in business networks: the role of collective action in constructing system-level goals. Ind Mark Manag

    Article  Google Scholar 

  11. Törnroos JÅ, Halinen A, Medlin CJ (2017) Dimensions of space in business network research. Ind Mark Manag 61:10–19

    Article  Google Scholar 

  12. Park KH, Favrel J (1999) Virtual enterprise-Information system and networking solution. Comput Ind Eng 37(1–2):441–444

    Article  Google Scholar 

  13. Godbole N, Belapure S (2011) Cyber security: understanding cyber crimes, computer forensic and legal perspective, 1st edn. Wiley India Pvt Ltd

    Google Scholar 

  14. Matthews R (1989) On the derivation of a “chaotic” encryption algorithm. Cryptologia 13(1):29–42

    Article  MathSciNet  Google Scholar 

  15. Schneier B (1996) Applied cryptography: protocols, algorithms and source code, C, 2nd ed. Wiley

    Google Scholar 

  16. Meraoumia A, Kadri F, Chitrob S, Bouridane A (2014) Improving biometric identification performance using PCANet deep learning & multispectral palmprint. In: Book of biometric security and privacy-opportunities & challenges in the big data Era. Published by Springer, pp 51–69

    Google Scholar 

  17. Faundez-Zanuy M, Elizondo DA, Ferrer-Ballester MA, Travieso-González CM (2007) Authentication of individuals using hand geometry biometrics: a neural network approach. Neural Process Lett 26(3):201–216

    Article  Google Scholar 

  18. Khan MK, Zhang J, Tian L (2007) Chaotic secure content-based hidden transmission of biometrics templates. Chaos Solitons Fractals 32:1749–1759

    Article  Google Scholar 

  19. Uludag U, Pankanti S, Prabhakar S (2004) Biometrics cryptosystems: issues and challenges. Proc IEEE 92(6):948–960

    Article  Google Scholar 

  20. Failla P, Sutcu Y, Barni M (2010) Esketch: a privacy-preserving fuzzy commitment scheme for authentication using encrypted biometrics. In: Proceedings of the 12th ACM workshop on multimedia and security, pp 241–246

    Google Scholar 

  21. Hoang T, Choi D, Nguyen T (2015) Gait authentication on mobile phone using biometric cryptosystem and fuzzy commitment scheme. Int J Inf Secur 14(6):1–12

    Article  Google Scholar 

  22. Charfi N, Trichili H, Alimi A, Solaiman B (2015) Personal recognition system using hand modality based on local features. In: 11th international conference on information assurance and security (IAS2015), pp 13–17

    Google Scholar 

  23. Kumar A, Wong DCM, Shen HC, Jain AK (2003) Personal verification using palmprint and hand geometry biometric. In: Proceedings of the 4th international conference on audio-and video-based biometric person authentication, pp 668–678

    Google Scholar 

  24. Ladoux P, Rosenberger C, Dorizzi B (2009) Palm vein verification system based on sift matching. In: 3rd international conference ICB, pp 1290–1298

    Chapter  Google Scholar 

  25. Wang WC, Chen WS, Shih SW (2009) Biometric recognition by fusing palmprint and hand-geometry based on morphology. In: Proceedings of the IEEE international conference on acoustics, speech and signal processing, pp 893–896

    Google Scholar 

  26. Choras M (2007) Image feature extraction methods for Ear biometrics. In: University of technology & life sciences, Bydgoszcz. Computer information systems and industrial management applications. IEEE Explore, pp 28–30

    Google Scholar 

  27. Wang X, Lei L, Wang M (2012) Palmprint verification based on 2D-Gabor wavelet and pulse-coupled neural network. Knowl-Based Syst 27:451–455

    Article  Google Scholar 

  28. Yasuda M (2017) Secure Hamming distance computation for biometrics using ideal-lattice and ring-LWE homomorphic encryption. J Inf Secur Glob Perspect 26(2):85–103

    Article  Google Scholar 

  29. PolyU. database. http://www4.comp.polyu.edu.hk/~biometrics/

  30. Thepade SD, Bhondave RK (2015) Bimodal biometric identification with palmprint and Iris Traits using Fractiona coefficients of Walsh, Haar and Kekre transforms. In: International conference on communication, information and computing technology (ICCICT), Mumbai, India

    Google Scholar 

  31. Meraoumia A, Chitroub S, Bendjenna H, Bouridane A (2016) An automated finger-knuckle-print identification system using jointly RBF & RFT classifiers. In: 15th international conference on ubiquitous computing and communications and international symposium on cyberspace and security (IUCC-CSS), Granada, Spain, pp 17–22

    Google Scholar 

Download references

Acknowledgements

The authors are grateful to the anonymous referees for their valuable and helpful comments. This research has been carried out within the CNEPRU project (Grant: B*02920-140028) of the Department of mathematics and computer sciences, University of Laarbi Tebessi. The authors thank Miss. Wissal Bouakal for her valuable help as well as staff of LAMIS laboratory for helpful comments and suggestions.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hakim Bendjenna .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer International Publishing AG, part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Meraoumia, A., Bendjenna, H., Dris, Y., Amroune, M. (2019). Enhancing Security and Privacy in Enterprises Network by Using Biometrics Technologies. In: Patnaik, S., Yang, XS., Tavana, M., Popentiu-Vlădicescu, F., Qiao, F. (eds) Digital Business. Lecture Notes on Data Engineering and Communications Technologies, vol 21. Springer, Cham. https://doi.org/10.1007/978-3-319-93940-7_8

Download citation

Publish with us

Policies and ethics