Visible to the public Promising Bio-Authentication Scheme to Protect Documents for E2E S2S in IoT-Cloud

TitlePromising Bio-Authentication Scheme to Protect Documents for E2E S2S in IoT-Cloud
Publication TypeConference Paper
Year of Publication2020
AuthorsSibahee, M. A. A., Lu, S., Abduljabbar, Z. A., Liu, E. X., Ran, Y., Al-ashoor, A. A. J., Hussain, M. A., Hussien, Z. A.
Conference Name2020 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC)
Date PublishedAug. 2020
PublisherIEEE
ISBN Number978-1-7281-7202-6
Keywordsauthentication, Bio- MAC, bio-authentication scheme, bio-key management, biometrics (access control), BIOS, cloud computing, cryptography, data integrity, disappearing authentication code, document image processing, documents protection, E2E S2S, feature extraction, handwritten character recognition, handwritten feature extraction, Handwritten Signature, HMAC-SHA-256, Human Behavior, Internet of Things, IoT-cloud, IoTs-Cloud, key agreement, local binary pattern, LSB, message authentication, Metrics, one-time bio-key, one-time message-image document code, one-time random pixel sequence, pubcrawl, Receivers, resilience, Resiliency, robust message anonymity, Scalability, security, security analysis, smart devices, Watermarking
Abstract

Document integrity and origin for E2E S2S in IoTcloud have recently received considerable attention because of their importance in the real-world fields. Maintaining integrity could protect decisions made based on these message/image documents. Authentication and integrity solutions have been conducted to recognise or protect any modification in the exchange of documents between E2E S2S (smart-to-smart). However, none of the proposed schemes appear to be sufficiently designed as a secure scheme to prevent known attacks or applicable to smart devices. We propose a robust scheme that aims to protect the integrity of documents for each users session by integrating HMAC-SHA-256, handwritten feature extraction using a local binary pattern, one-time random pixel sequence based on RC4 to randomly hide authentication codes using LSB. The proposed scheme can provide users with one-time bio-key, robust message anonymity and a disappearing authentication code that does not draw the attention of eavesdroppers. Thus, the scheme improves the data integrity for a users messages/image documents, phase key agreement, bio-key management and a one-time message/image document code for each users session. The concept of stego-anonymity is also introduced to provide additional security to cover a hashed value. Finally, security analysis and experimental results demonstrate and prove the invulnerability and efficiency of the proposed scheme.

URLhttps://ieeexplore.ieee.org/document/9259519
DOI10.1109/ICSPCC50002.2020.9259519
Citation Keysibahee_promising_2020