Contribution of TEE and Parallel Computing to Performance and Security of Biometric Authentication Improvement

Contribution of TEE and Parallel Computing to Performance and Security of Biometric Authentication Improvement

Authors

  • Maxim EDOH University of Abomey-Calavi
  • Tahirou DJARA University of Abomey-Calavi
  • Aziz SOBABE University of Abomey-Calavi
  • Antoine VIANOU University of Abomey-Calavi

DOI:

https://doi.org/10.24191/jcrinn.v8i2.371

Keywords:

parallel computing, trusted execution environment, biometric data, SGX

Abstract

In a world increasingly dominated by digital interactions, it has become essential to guarantee the authenticity of personal identities. Traditional authentication methods, based on passwords or tokens, are proving inadequate in the face of advanced cyber threats. In response, the field of biometric recognition has emerged as a transformative force, offering a new paradigm for identity verification with significant accuracy and convenience. The problems that arise here are the vulnerability and confidentiality of biometric data before, during and after a biometric recognition operation, and the low processing speed during the same operation. The aim of this work is to propose a combination of the concepts of parallel computing and Trusted Execution Environments (TEE) as a solution to the problems raised. Finally, a hardware-assisted technology namely Intel SGX (Software Guard Extensions) is proposed for practical implementations.

Downloads

Download data is not yet available.

Author Biographies

Maxim EDOH, University of Abomey-Calavi

Agnite Maxim Wilfrid Straïker EDOH is a PhD student at the University of Abomey-Calavi, Benin. His research interests include Computer Networking, Biometric Authentication, Computer Security, Internet of Things, industrial applications and symbolic programming. He is a member of the research Laboratory of Electronics, Telecommunications and Applied Computing (LETIA / EPAC). He graduated as a computer networking engineer in 2008 from the Polytechnic School of Abomey-Calavi (EPAC), with a Master degree in Computer Networking and Telecommunications, from the Polytechnic School of Abomey-Calavi (EPAC) of the University of Abomey-Calavi in 2016. He is a consultant in the field of Computer Networking, Computer Security, RFID Security and Desktop, Web and Mobile development.

Tahirou DJARA, University of Abomey-Calavi

Tahirou Djara is a Senior Lecturer at the Polytechnic School of Abomey-Calavi located in the University of Abomey-Calavi, Bénin. His research interests include: biometrics, signal and image processing, computational intelligence, industrial applications and symbolical programming. He is member of the research laboratory: Laboratory of Electronics, Telecommunications and Applied Data Processing Technology (Laboratoire d’Electrotechnique de Télécommunication et d’Informatique Appliquée– LETIA/EPAC). He received the PhD degree in signals and image processing from the University of Abomey-Calavi, in 2013. He is a consultant in quality assurance in higher education and consultant in the field of science and engineering technology.

Aziz SOBABE, University of Abomey-Calavi

Abdou-Aziz Sobabe holds a PhD in Engineering Sciences from the University of Abomey-Calavi in Benin. He conducts his research at the Laboratory of Electrical Engineering, Telecommunications and Applied Computer Science (LETIA). His research interests include biometrics, signal and image processing, affective computing and software engineering. His areas of specialization include multimodal biometrics, non-contact biometrics, score fusion and user-specific parameters in biometric systems. In the area of software engineering, he is interested in object-oriented programming and relational databases for applications. In the field of artificial intelligence, he uses machine learning methods applied to computer security (biometric authentication), e-Agriculture, e-Health.

Antoine VIANOU, University of Abomey-Calavi

Antoine VIANOU is Full Professor of Engineering Sciences and Techniques at the University of Abomey-Calavi. An engineer from the École de Technologie Supérieure in Montreal Canada (1980), he obtained his Diploma of Advanced Studies in Energy Systems and Energy Mastery from the University of Paris XII (1989), Dr. Engineer from the University of Dakar 1992, Doctor of Physical Sciences in 1994 from the University of Évry Val d'Essonne France, made Knight of the National Order of Benin (2012), He is a founding member of the National Academy of Sciences, Arts and Letters of Benin ANSALB (2013).

References

Sabt, M., Achemlal, M. & Bouabdallah, A. (2015). Trusted Execution Environment: What It is,

and What It is Not, IEEE Trustcom/BigDataSE/ISPA, Helsinki, Finland, 2015, pp. 57-64, doi:

1109/Trustcom.2015.357. https://ieeexplore.ieee.org/abstract/document/7345265

Samsung Inc. (2018). « Samsung KNOX ». Retrieved December 01, 2018, 2018,

https://www.samsungknox.com/en/knox-platform/knox- security

TrustKernel. (2018). « TrustKernel TEEReady ». Retrieved December 01, 2018, 2018,

https://dev.trustkernel.com/ready

GlobalPlatform. (2018). Retrieved December 01, 2018, 2018,

https://www.globalplatform.org/

ARM. (2016). « Connected devices need e-commerce standard security say cyber security experts. »,

Retrieved January 01, 2016, 2016, https://goo.gl/1ePiQC

Google Project Zero. (2017). Retrieved March 11, 2017, 2017,

https://googleprojectzero.blogspot.com/2017/07/trust-issues-exploiting-trustzone-tees.html

Machiry, A., Gustafson, E., Spensky, C., Salls, C., Stephens, N., Wang, R., Bianchi A., Choe, Y. R.,

Kruegel, C. & Vigna, G. (2017). BOOMERANG: Exploiting the Semantic Gap in Trusted

Execution Environments.

Alipay Member Protection. (2018). Retrieved December 01, 2018, 2018,

https://intl.alipay.com/ihome/user/protect/memberProtect.htm

Akram, A. (2021), Trusted Execution for High-Performance Computing,

http://www.ayazakram.com/papers/eurodw.pdf

Abdellatif, M., (2016). Accelerating mobile security processing with parallel computing. Electronic

master's thesis, Montreal, High Technology School.

Wang, T. & Kemao, Q. (2018). Parallel computing in experimental mechanics and optical

measurement: A review (II), https://www.sciencedirect.com/science/article/pii/S0143816617302154

Padua D., (2011). Encyclopedia of parallel computing, volume 4,

https://books.google.com/books?hl=fr&lr=&id=Hm6LaufVKFEC&oi=fnd&pg=PR1&dq=Padua+D.,+2011.+Encyclopedia+of+parallel+computing,+volume+4&ots=uFGOhSz9dU&sig=gyggeh8xovYXwcAXBoqa8Gf9LOA

Mangata, B. B., Muamba, K., Khalaba, F., Bukanga, C. P. & Kisiaka, M., (2022), Parallel and

Distributed Computation of a Fingerprint Access Control System, Journal of Computing

Research and Innovation (JCRINN) Vol. 7 No. 2 (2022) (pp1-9)

Supatmi, S., Sumitra, I. D., (2020), Fingerprint Matching Using Bozorth3 Algorithm and Parallel

Computation on NVIDIA Compute Unified Device Architecture, IOP Conference Series:

Materials Science and Engineering

McKeen, F. et al. (2013). Innovative Instructions and Software Model for Isolated Execution. In HASP.

Downloads

Published

2023-09-01

How to Cite

EDOH, M., DJARA, T., SOBABE, A., & VIANOU, A. (2023). Contribution of TEE and Parallel Computing to Performance and Security of Biometric Authentication Improvement. Journal of Computing Research and Innovation, 8(2), 156–167. https://doi.org/10.24191/jcrinn.v8i2.371

Issue

Section

General Computing
Loading...