Contribution of TEE and Parallel Computing to Performance and Security of Biometric Authentication Improvement
DOI:
https://doi.org/10.24191/jcrinn.v8i2.371Keywords:
parallel computing, trusted execution environment, biometric data, SGXAbstract
In a world increasingly dominated by digital interactions, it has become essential to guarantee the authenticity of personal identities. Traditional authentication methods, based on passwords or tokens, are proving inadequate in the face of advanced cyber threats. In response, the field of biometric recognition has emerged as a transformative force, offering a new paradigm for identity verification with significant accuracy and convenience. The problems that arise here are the vulnerability and confidentiality of biometric data before, during and after a biometric recognition operation, and the low processing speed during the same operation. The aim of this work is to propose a combination of the concepts of parallel computing and Trusted Execution Environments (TEE) as a solution to the problems raised. Finally, a hardware-assisted technology namely Intel SGX (Software Guard Extensions) is proposed for practical implementations.
Downloads
References
Sabt, M., Achemlal, M. & Bouabdallah, A. (2015). Trusted Execution Environment: What It is,
and What It is Not, IEEE Trustcom/BigDataSE/ISPA, Helsinki, Finland, 2015, pp. 57-64, doi:
1109/Trustcom.2015.357. https://ieeexplore.ieee.org/abstract/document/7345265
Samsung Inc. (2018). « Samsung KNOX ». Retrieved December 01, 2018, 2018,
https://www.samsungknox.com/en/knox-platform/knox- security
TrustKernel. (2018). « TrustKernel TEEReady ». Retrieved December 01, 2018, 2018,
https://dev.trustkernel.com/ready
GlobalPlatform. (2018). Retrieved December 01, 2018, 2018,
https://www.globalplatform.org/
ARM. (2016). « Connected devices need e-commerce standard security say cyber security experts. »,
Retrieved January 01, 2016, 2016, https://goo.gl/1ePiQC
Google Project Zero. (2017). Retrieved March 11, 2017, 2017,
https://googleprojectzero.blogspot.com/2017/07/trust-issues-exploiting-trustzone-tees.html
Machiry, A., Gustafson, E., Spensky, C., Salls, C., Stephens, N., Wang, R., Bianchi A., Choe, Y. R.,
Kruegel, C. & Vigna, G. (2017). BOOMERANG: Exploiting the Semantic Gap in Trusted
Execution Environments.
Alipay Member Protection. (2018). Retrieved December 01, 2018, 2018,
https://intl.alipay.com/ihome/user/protect/memberProtect.htm
Akram, A. (2021), Trusted Execution for High-Performance Computing,
http://www.ayazakram.com/papers/eurodw.pdf
Abdellatif, M., (2016). Accelerating mobile security processing with parallel computing. Electronic
master's thesis, Montreal, High Technology School.
Wang, T. & Kemao, Q. (2018). Parallel computing in experimental mechanics and optical
measurement: A review (II), https://www.sciencedirect.com/science/article/pii/S0143816617302154
Padua D., (2011). Encyclopedia of parallel computing, volume 4,
Mangata, B. B., Muamba, K., Khalaba, F., Bukanga, C. P. & Kisiaka, M., (2022), Parallel and
Distributed Computation of a Fingerprint Access Control System, Journal of Computing
Research and Innovation (JCRINN) Vol. 7 No. 2 (2022) (pp1-9)
Supatmi, S., Sumitra, I. D., (2020), Fingerprint Matching Using Bozorth3 Algorithm and Parallel
Computation on NVIDIA Compute Unified Device Architecture, IOP Conference Series:
Materials Science and Engineering
McKeen, F. et al. (2013). Innovative Instructions and Software Model for Isolated Execution. In HASP.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 Journal of Computing Research and Innovation
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.