Affiliation:
1. Faculty of Automation, Computer Sciences, Electronics and Electrical Engineering, “Dunărea de Jos” University, Științei Street No. 2, 800210 Galați, Romania
Abstract
In the current context in which user authentication is the first line of defense against emerging attacks and can be considered a defining element of any security infrastructure, the need to adopt alternative, non-invasive, contactless, and scalable authentication mechanisms is mandatory. This paper presents initial research on the design, implementation, and evaluation of a multi-factor authentication mechanism that combines facial recognition with a fully homomorphic encryption algorithm. The goal is to minimize the risk of unauthorized access and uphold user confidentiality and integrity. The proposed device is implemented on the latest version of the Raspberry Pi and Arduino ESP 32 modules, which are wirelessly connected to the computer system. Additionally, a comprehensive evaluation, utilizing various statistical parameters, demonstrates the performance, the limitations of the encryption algorithms proposed to secure the biometric database, and also the security implications over the system resources. The research results illustrate that the Brakerski–Gentry–Vaikuntanathan algorithm can achieve higher performance and efficiency when compared to the Brakerski–Fan–Vercauteren algorithm, and proved to be the best alternative for the designed mechanism because it effectively enhances the level of security in computer systems, showing promise for deployment and seamless integration into real-world scenarios of network architectures.
Subject
Fluid Flow and Transfer Processes,Computer Science Applications,Process Chemistry and Technology,General Engineering,Instrumentation,General Materials Science
Reference63 articles.
1. Chang, C.C. (2019). Privacy-Preserving Information Hiding and Its Applications. [Ph.D. Thesis, University of Warwick].
2. Department of Homeland Security (2023, September 03). Review of CBP’s Major Cybersecurity Incident during a 2019 Biometric Pilot, Available online: https://www.oig.dhs.gov/reports/2020/review-cbps-major-cybersecurity-incident-during-2019-biometric-pilot/oig-20-71-sep20.
3. Boonkrong, S. (2021). Authentication and Access Control: Practical Cryptography Methods and Tools, Apress.
4. Temoshok, D. (2022). Digital Identity Guidelines Online, National Institute of Standards and Technology.
5. Quality measures in biometric systems;Fierrez;IEEE Secur. Priv.,2022