Contribution of TEE and Parallel Computing to Performance and Security of Biometric Authentication Improvement
Keywords:parallel computing, trusted execution environment, biometric data, SGX
In a world increasingly dominated by digital interactions, it has become essential to guarantee the authenticity of personal identities. Traditional authentication methods, based on passwords or tokens, are proving inadequate in the face of advanced cyber threats. In response, the field of biometric recognition has emerged as a transformative force, offering a new paradigm for identity verification with significant accuracy and convenience. The problems that arise here are the vulnerability and confidentiality of biometric data before, during and after a biometric recognition operation, and the low processing speed during the same operation. The aim of this work is to propose a combination of the concepts of parallel computing and Trusted Execution Environments (TEE) as a solution to the problems raised. Finally, a hardware-assisted technology namely Intel SGX (Software Guard Extensions) is proposed for practical implementations.
Sabt, M., Achemlal, M. & Bouabdallah, A. (2015). Trusted Execution Environment: What It is,
and What It is Not, IEEE Trustcom/BigDataSE/ISPA, Helsinki, Finland, 2015, pp. 57-64, doi:
Samsung Inc. (2018). « Samsung KNOX ». Retrieved December 01, 2018, 2018,
TrustKernel. (2018). « TrustKernel TEEReady ». Retrieved December 01, 2018, 2018,
GlobalPlatform. (2018). Retrieved December 01, 2018, 2018,
ARM. (2016). « Connected devices need e-commerce standard security say cyber security experts. »,
Retrieved January 01, 2016, 2016, https://goo.gl/1ePiQC
Google Project Zero. (2017). Retrieved March 11, 2017, 2017,
Machiry, A., Gustafson, E., Spensky, C., Salls, C., Stephens, N., Wang, R., Bianchi A., Choe, Y. R.,
Kruegel, C. & Vigna, G. (2017). BOOMERANG: Exploiting the Semantic Gap in Trusted
Alipay Member Protection. (2018). Retrieved December 01, 2018, 2018,
Akram, A. (2021), Trusted Execution for High-Performance Computing,
Abdellatif, M., (2016). Accelerating mobile security processing with parallel computing. Electronic
master's thesis, Montreal, High Technology School.
Wang, T. & Kemao, Q. (2018). Parallel computing in experimental mechanics and optical
measurement: A review (II), https://www.sciencedirect.com/science/article/pii/S0143816617302154
Padua D., (2011). Encyclopedia of parallel computing, volume 4,
Mangata, B. B., Muamba, K., Khalaba, F., Bukanga, C. P. & Kisiaka, M., (2022), Parallel and
Distributed Computation of a Fingerprint Access Control System, Journal of Computing
Research and Innovation (JCRINN) Vol. 7 No. 2 (2022) (pp1-9)
Supatmi, S., Sumitra, I. D., (2020), Fingerprint Matching Using Bozorth3 Algorithm and Parallel
Computation on NVIDIA Compute Unified Device Architecture, IOP Conference Series:
Materials Science and Engineering
McKeen, F. et al. (2013). Innovative Instructions and Software Model for Isolated Execution. In HASP.
How to Cite
Copyright (c) 2023 Journal of Computing Research and Innovation
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.