Facial Authentication as A Possible Solution to the Challenges in User’s Security and Privacy in Web Applications
Vol 1, Issue 1, 2018
VIEWS - 327 (Abstract) 33 (PDF) 12 (PDF)
Abstract
In recent years, new technologies have become the focal point of any operation or digital system. Smartphones are increasingly gaining ground as a technological tool that combines a large number of applications and online services. It is an observable reality, as operations are increasingly being carried out in electronic commerce applications, banking transactions, health applications, and distance education. However, the widespread use of these types of practices means that more risks can present themselves through the internet. Therefore, any organization must take into account changes in virtual security, having to face possible cyber attacks or identity theft. Although smartphones have become a powerful tool in daily lives of most people, it is true that it has brought a series of challenges in the security and privacy of users, where facial authentication seems to be a possible solution to this type of problems. This article reviews the most relevant current existing literature about facial authentication as a biometric system, as well as the systems available on the market, so that organizations can use them with its clients or users.
Keywords
References
1. Sivarajah, U., Irani, Z., & Weerakkody, V. (2015). Evaluating the use and impact of Web 2.0 technologies in local government. Government Information Quarterly, 32(4), 473-487. DOI: https://doi.org/10.1016/j.giq.2015.06.004
2. Hu, P., Ning, H., Qiu, T., Song, H., Wang, Y., & Yao, X. (2017). Security and privacy preservation scheme of face identification and resolution framework using fog computing in internet of things. IEEE Internet of Things Journal, 4(5), 1143-1155. DOI: 10.1109/JIOT.2017.2659783
3. Miranda, J., Mäkitalo, N., Garcia-Alonso, J., Berrocal, J., Mikkonen, T., Canal, C., & Murillo, J. M. (2015). From the Internet of Things to the Internet of People. IEEE Internet Computing, 19(2), 40-47. DOI: 10.1109/MIC.2015.24
4. Memon, N. (2017). How Biometric Authentication Poses New Challenges to Our Security and Privacy [In the Spotlight]. IEEE Signal Processing Magazine, 34(4), 196-194. DOI: 10.1109/MSP.2017.2697179
5. Siddiqui, Z., Abdullah, A. H., Khan, M. K., & Alghamdi, A. S. (2014). Smart environment as a service: three factor cloud based user authentication for telecare medical information system. Journal of medical systems, 38(1), 9997. DOI: https://doi.org/10.1007/s10916-013-9997-5
6. Zhang, Z., Aziz, E. S., Esche, S., & Chassapis, C. (2018). A Virtual Proctor with Biometric Authentication for Facilitating Distance Education. In Online Engineering & Internet of Things(pp. 110-124). Springer, Cham. DOI: https://doi.org/10.1007/978-3-319-64352-6_11
7. Ometov, A., Bezzateev, S., Mäkitalo, N., Andreev, S., Mikkonen, T., & Koucheryavy, Y. (2018). Multi-Factor Authentication: A Survey. Cryptography, 2(1), 1-31. DOI: 10.3390/cryptography2010001
8. Jiang, L., & Meng, W. (2017). Smartphone user authentication using touch dynamics in the big data era: Challenges and opportunities. In Biometric Security and Privacy (pp. 163-178). Springer, Cham. DOI: https://doi.org/10.1007/978-3-319-47301-7_7
9. Galdi, C., Nappi, M., Dugelay, J. L., & Yu, Y. (2018). Exploring New Authentication Protocols for Sensitive Data Protection on Smartphones. IEEE Communications Magazine, 56(1), 136-142.
10. Apple (2018). https://www.apple.com/es/iphone-x/ Website of Apple. Last visit: March 05, 2018.
11. Samsung (2018).
12. http://www.samsung.com/es/smartphones/galaxy-s8/ Website of Samsung. Last visit: March 05, 2018.
13. Traoré, I., Nakkabi, Y., Saad, S., Sayed, B., Ardigo, J. D., & de Faria Quinan, P. M. (2017). Ensuring Online Exam Integrity Through Continuous Biometric Authentication. In Information Security Practices (pp. 73-81). Springer, Cham. DOI: https://doi.org/10.1007/978-3-319-48947-6_6
14. Karim, N. A., & Shukur, Z. (2015). Review of user authentication methods in online examination. Asian Journal of Information Technology, 14(5), 166-175. DOI: 10.3923/ajit.2015.166-175
15. Guillén-Gamez, F. D., García-Magariño, I., Bravo, J., & Plaza, I. (2015). Exploring the influence of facial verification software on student academic performance in online learning environments. Int. J. Eng. Edu., 31(6A), 1622-1628.
16. Shah, K., Shah, S., Shah, T., Shinde, R., & Gharat, S. (2017). Secure Examination System using Biometric and QR Code Technology. International Journal of Engineering Science, 10365.
17. Fenu, G., Marras, M., & Boratto, L. (2017). A multi-biometric system for continuous student authentication in e-learning platforms. Pattern Recognition Letters. DOI: https://doi.org/10.1016/j.patrec.2017.03.027
18. Labayen, M., Vea, R., Flórez, J., Guillén-Gámez, F. D., & García-Magariño, I. (2014). Smowl: a tool for continuous student validation based on face recognition for online learning. In Edulearn14 Proceedings (pp. 5354-5359). IATED.
19. Guillén-Gámez, F. D., García-Magariño, I., Bravo-Agapito, J., Lacuesta, R., & Lloret, J. (2017). A proposal to improve the authentication process in m-health environments. IEEE Access, 5, 22530-22544. DOI: 10.1109/ACCESS.2017.2752176
20. Kawamata, T., Ishii, T., Fujimori, S., & Akakura, T. (2016, November). Student authentication by updated facial information with weighting coefficient in e-Learning. In Region 10 Conference (TENCON), 2016 IEEE (pp. 551-555). IEEE. DOI: 10.1109/TENCON.2016.7848061
21. Li, Y., Xu, K., Yan, Q., Li, Y., & Deng, R. H. (2014, June). Understanding OSN-based facial disclosure against face authentication systems. In Proceedings of the 9th ACM symposium on Information, computer and communications security (pp. 413-424). ACM. DOI: 10.1145/2590296.2590315
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
This site is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.