Promising Bio-Authentication Scheme to Protect Documents for E2E S2S in IoT-Cloud
Title | Promising Bio-Authentication Scheme to Protect Documents for E2E S2S in IoT-Cloud |
Publication Type | Conference Paper |
Year of Publication | 2020 |
Authors | Sibahee, M. A. A., Lu, S., Abduljabbar, Z. A., Liu, E. X., Ran, Y., Al-ashoor, A. A. J., Hussain, M. A., Hussien, Z. A. |
Conference Name | 2020 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC) |
Date Published | Aug. 2020 |
Publisher | IEEE |
ISBN Number | 978-1-7281-7202-6 |
Keywords | authentication, Bio- MAC, bio-authentication scheme, bio-key management, biometrics (access control), BIOS, cloud computing, cryptography, data integrity, disappearing authentication code, document image processing, documents protection, E2E S2S, feature extraction, handwritten character recognition, handwritten feature extraction, Handwritten Signature, HMAC-SHA-256, Human Behavior, Internet of Things, IoT-cloud, IoTs-Cloud, key agreement, local binary pattern, LSB, message authentication, Metrics, one-time bio-key, one-time message-image document code, one-time random pixel sequence, pubcrawl, Receivers, resilience, Resiliency, robust message anonymity, Scalability, security, security analysis, smart devices, Watermarking |
Abstract | Document integrity and origin for E2E S2S in IoTcloud have recently received considerable attention because of their importance in the real-world fields. Maintaining integrity could protect decisions made based on these message/image documents. Authentication and integrity solutions have been conducted to recognise or protect any modification in the exchange of documents between E2E S2S (smart-to-smart). However, none of the proposed schemes appear to be sufficiently designed as a secure scheme to prevent known attacks or applicable to smart devices. We propose a robust scheme that aims to protect the integrity of documents for each users session by integrating HMAC-SHA-256, handwritten feature extraction using a local binary pattern, one-time random pixel sequence based on RC4 to randomly hide authentication codes using LSB. The proposed scheme can provide users with one-time bio-key, robust message anonymity and a disappearing authentication code that does not draw the attention of eavesdroppers. Thus, the scheme improves the data integrity for a users messages/image documents, phase key agreement, bio-key management and a one-time message/image document code for each users session. The concept of stego-anonymity is also introduced to provide additional security to cover a hashed value. Finally, security analysis and experimental results demonstrate and prove the invulnerability and efficiency of the proposed scheme. |
URL | https://ieeexplore.ieee.org/document/9259519 |
DOI | 10.1109/ICSPCC50002.2020.9259519 |
Citation Key | sibahee_promising_2020 |
- pubcrawl
- IoTs-Cloud
- key agreement
- local binary pattern
- LSB
- message authentication
- Metrics
- one-time bio-key
- one-time message-image document code
- one-time random pixel sequence
- IoT-cloud
- Receivers
- resilience
- Resiliency
- robust message anonymity
- Scalability
- security
- Security analysis
- smart devices
- Watermarking
- document image processing
- Bio- MAC
- bio-authentication scheme
- bio-key management
- biometrics (access control)
- BIOS
- Cloud Computing
- Cryptography
- data integrity
- disappearing authentication code
- authentication
- documents protection
- E2E S2S
- feature extraction
- handwritten character recognition
- handwritten feature extraction
- Handwritten Signature
- HMAC-SHA-256
- Human behavior
- Internet of Things