Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available

(175.68KB)
This is an Open Access publication published under CSC-OpenAccess Policy.
Publications from CSC-OpenAccess Library are being accessed from over 74 countries worldwide.
Protecting Identity using Biometrics Protection Systems
Fathimath Sabena, Ali Dehghantanha, Andy Seddon
Pages - 125 - 135     |    Revised - 30-06-2010     |    Published - 10-08-2010
Volume - 4   Issue - 3    |    Publication Date - July 2010  Table of Contents
MORE INFORMATION
KEYWORDS
Biometrics, Identity Management, Biometric Systems
ABSTRACT
Biometrics Identity Management (BIdM) is a newly rising and developing discipline which could be expressed as the study of verification and validation methods for the next generation. The two key terms enclosed in the title of this paper are– “Biometrics Vulnerabilities” and “Identity Management”. Every one of us has an identity. By utilizing this identity along with distinctive characteristics we distinguish ourselves from one another. By cross referencing the data from both sources, a guideline that would adapt the best practices to maintain the sequence of BIdM and identity theft integrity was designed. Based on the findings a guideline is proposed to the experts and end-users to use. A walk through with the BIdM consultant was done to identify areas of improvement to fine tune the artifact. For proper identity management this guideline can be used as the processes in data collection and data maintenance procedures are included. The procedures include extracting the data from data collection for proofs, data matching and handling the data in an appropriate way. The guideline will have its proper BIdM techniques by having the best practices of tackling its vulnerabilities. Databases having biometric data are themselves a threat to privacy. While distinguishing gaps in BIdM and discovering new approaches to tackle the vulnerabilities, issues and protect such databases and increasing the awareness programs, this research can be further extended.
1 Google Scholar 
2 Academic Journals Database 
3 Academic Index 
4 CiteSeerX 
5 refSeek 
6 iSEEK 
7 Socol@r  
8 Libsearch 
9 Bielefeld Academic Search Engine (BASE) 
10 Scribd 
11 WorldCat 
12 SlideShare 
13 PDFCAST 
14 PdfSR 
1 Gordon, A., Loeb, M., Lucyshyn, W., Richardson, R., 2006, Computer Crime and Security Survey, [Online], Computer Security Institute & FBI, [Online] Available from: http://pdf.textfiles.com/security/fbi2006.pdf [Accessed on 19th July 2009]
2 Roberts, C., 2006, Biometric Technologies – Fingerprints, [Online] Available from: http://www.ccip.govt.nz/newsroom/information-notes/2006/biometrics-technologiesfingerprints. pdf [Accessed on 22nd July 2009]
3 Managing Australia's Borders, “The Department of Immigration and Citizenship (DIAC) [Online], Available from: http://www.immi.gov.au/managing-australias-borders/bordersecurity/ systems/identity.htm [Accessed on 12th September 2009]
4 Patentdocs, 2009, Systems and Methods for Accessing a Tamperproof Storage Device in a Wireless Communication Device Using Biometric Data [Online], Available from: http://www.faqs.org/patents/imgfull/20090193519_07 [Accessed on 10st October 2009]
5 Home Office – Identity and passport service, “Identity cards for airside workers”, [Online], Available from: http://www.ips.gov.uk/cps/rde/xchg/ips_live/hs.xsl/964.htm [Accessed on 30th September 2009]
Mr. Fathimath Sabena
- India
Mr. Ali Dehghantanha
Asia Pacific University College of Technology & Innovation (UCTI) - Malaysia
dehghantanha@yahoo.com
Mr. Andy Seddon
- Malaysia