Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Design and implementation of fingerprint authentication terminal APP in mobile cloud environment based on TrustZone
WANG Zhiheng, XU Yanyan
Journal of Computer Applications    2020, 40 (11): 3255-3260.   DOI: 10.11772/j.issn.1001-9081.2020020273
Abstract282)      PDF (892KB)(619)       Save
Focused on the potential safety hazard of leakage of fingerprint and other biometrics in the cloud environment, as well as the lack of security or convenience of the existing biometric authentication schemes, a terminal APP of trusted fingerprint authentication based on orthogonal decomposition and TrustZone was designed and implemented. The sensitive operations such as fingerprint feature extraction, fingerprint template generation were executed in the trusted execution environment provided by the hardware isolation mechanism of TrustZone, making these operations isolated from the applications in the general execution environment to resist the attacks of malicious programs and ensure the security of the authentication process. The fingerprint template generated on the basis of orthogonal decomposition algorithm integrate the random noise while remaining the matching ability, so that it was able to resist the attack against the feature template to a certain extent. As a result, the fingerprint template was able to be stored and transmitted in the cloud environment, so that the user and the device were unbound, which improved the convenience of biometric authentication. Experiments and theoretical analysis show that the correlation and randomness of the fingerprint template of the proposed algorithm is higher than those of original feature and random projection algorithms, so that the algorithm has stronger security. In addition, the experimental results of time and storage overheads as well as recognition accuracy show that, both convenience and security are considered in this APP, meeting the requirements of security authentication in mobile cloud environment.
Reference | Related Articles | Metrics