Palm vein pseudonym for anonymous database record

Every organizations nowadays need to collect and store tremendous amount of data for good purpose. Cloud service and wireless network service are widely used to manage those data. The services can reduce the time consuming to achieved production and ease people to manage their works. Typical service...

Full description

Saved in:
Bibliographic Details
Main Authors: Nazari, N. H. M., Razak, S. A.
Format: Conference or Workshop Item
Language:English
Published: 2019
Subjects:
Online Access:http://eprints.utm.my/id/eprint/91701/1/NurHafizahNazari2019_PalmVeinPseudonym.pdf
http://eprints.utm.my/id/eprint/91701/
http://www.dx.doi.org/10.1109/IISA.2018.8631463
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Every organizations nowadays need to collect and store tremendous amount of data for good purpose. Cloud service and wireless network service are widely used to manage those data. The services can reduce the time consuming to achieved production and ease people to manage their works. Typical services are using unique identifier to store the data in digital database. There are some weaknesses using unique identifier to store the data. The unique identifier is obviously linkable to the owner of the data such as name, Identity card number, address and so on. The adversary may use the unique identifier to steal the data. They may guess or eavesdrop to obtain the data. It can be leads to the data exposure and lack in preserving the data privacy. Therefore, data privacy become the important issue to take care of. This is because, during the transaction of the data and information using the current services, the data and information may be exposed and leaked to unwanted entity. Other than that, services attack also may be occurred such as forgery attack, spoofing attack, and many more during the data transaction. Thus, we proposed biometric authentication system using palm vein is used during the authentication process. To ensure the data in the database are preserved, pseudonym generation approach is used to make the database record is anonymous. Therefore, the adversary or unauthorized entity could not steal the data and information of authorized user.