Integration biometrics in web application: Security for web apps

To evaluate the effectiveness of biometric security systems, an information theoretic framework is constructed. First, two performance metrics privacy, determined by the biometric measurements' normalized equivocation rate, and security, determined by the biometric measurements' key genera...

Full description

Saved in:
Bibliographic Details
Main Authors: Wulandari Kusuma Herdanu, Rabab Alayham Abbas Helmi, Mariana Syamsudin
Format: Article
Language:English
Published: Northern Negros State College of Science and Technology (NONESCOST) 2023-06-01
Series:International Research Journal of Science, Technology, Education, and Management
Subjects:
Online Access:https://irjstem.com/wp-content/uploads/2023/07/IRJSTEM_V3N2_2023_P09.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1849405423206006784
author Wulandari Kusuma Herdanu
Rabab Alayham Abbas Helmi
Mariana Syamsudin
author_facet Wulandari Kusuma Herdanu
Rabab Alayham Abbas Helmi
Mariana Syamsudin
author_sort Wulandari Kusuma Herdanu
collection DOAJ
description To evaluate the effectiveness of biometric security systems, an information theoretic framework is constructed. First, two performance metrics privacy, determined by the biometric measurements' normalized equivocation rate, and security, determined by the biometric measurements' key generation rate are specified. Then, it is decided that there is a fundamental tradeoff between these two measurements. First, we investigate the case where a potential attacker has no side knowledge. For this situation, the privacy-security region which defines the tradeoff mentioned above is derived. In perfect privacy biometric security systems, common knowledge among random variables plays a significant role. The case where the adversary possesses side knowledge is then considered. In this scenario, the privacy-security tradeoff has inner and outside bounds. Client-server and locally installable apps, which are getting older, have lost a considerable amount of market share to web applications. It is now possible because of some special benefits that web applications provide. They can function just as well as locally installed software and are accessible through web browsers without the need for installation or upkeep. Due to the lack of resources required by enterprises to administer them locally, web applications have gained popularity more swiftly. Now that new technologies, standards, and APIs have been developed, it is possible to employ more information security safeguards. The following sections of this article go into greater detail about web apps, web-based biometrics, and the integration of biometric authentication in web applications.
format Article
id doaj-art-82b4fd736f974a3d843d8f8ddbacab91
institution Kabale University
issn 2799-063X
2799-0648
language English
publishDate 2023-06-01
publisher Northern Negros State College of Science and Technology (NONESCOST)
record_format Article
series International Research Journal of Science, Technology, Education, and Management
spelling doaj-art-82b4fd736f974a3d843d8f8ddbacab912025-08-20T03:36:41ZengNorthern Negros State College of Science and Technology (NONESCOST)International Research Journal of Science, Technology, Education, and Management2799-063X2799-06482023-06-0132103116https://doi.org/10.5281/zenodo.8139747Integration biometrics in web application: Security for web appsWulandari Kusuma Herdanu0Rabab Alayham Abbas Helmi1Mariana Syamsudin2Management & Science University, MalaysiaManagement & Science University, MalaysiaPontianak State Polytechnic, IndonesiaTo evaluate the effectiveness of biometric security systems, an information theoretic framework is constructed. First, two performance metrics privacy, determined by the biometric measurements' normalized equivocation rate, and security, determined by the biometric measurements' key generation rate are specified. Then, it is decided that there is a fundamental tradeoff between these two measurements. First, we investigate the case where a potential attacker has no side knowledge. For this situation, the privacy-security region which defines the tradeoff mentioned above is derived. In perfect privacy biometric security systems, common knowledge among random variables plays a significant role. The case where the adversary possesses side knowledge is then considered. In this scenario, the privacy-security tradeoff has inner and outside bounds. Client-server and locally installable apps, which are getting older, have lost a considerable amount of market share to web applications. It is now possible because of some special benefits that web applications provide. They can function just as well as locally installed software and are accessible through web browsers without the need for installation or upkeep. Due to the lack of resources required by enterprises to administer them locally, web applications have gained popularity more swiftly. Now that new technologies, standards, and APIs have been developed, it is possible to employ more information security safeguards. The following sections of this article go into greater detail about web apps, web-based biometrics, and the integration of biometric authentication in web applications.https://irjstem.com/wp-content/uploads/2023/07/IRJSTEM_V3N2_2023_P09.pdfbiometricssecurityweb apps
spellingShingle Wulandari Kusuma Herdanu
Rabab Alayham Abbas Helmi
Mariana Syamsudin
Integration biometrics in web application: Security for web apps
International Research Journal of Science, Technology, Education, and Management
biometrics
security
web apps
title Integration biometrics in web application: Security for web apps
title_full Integration biometrics in web application: Security for web apps
title_fullStr Integration biometrics in web application: Security for web apps
title_full_unstemmed Integration biometrics in web application: Security for web apps
title_short Integration biometrics in web application: Security for web apps
title_sort integration biometrics in web application security for web apps
topic biometrics
security
web apps
url https://irjstem.com/wp-content/uploads/2023/07/IRJSTEM_V3N2_2023_P09.pdf
work_keys_str_mv AT wulandarikusumaherdanu integrationbiometricsinwebapplicationsecurityforwebapps
AT rababalayhamabbashelmi integrationbiometricsinwebapplicationsecurityforwebapps
AT marianasyamsudin integrationbiometricsinwebapplicationsecurityforwebapps