Access Control System based on Secret Sharing Scheme with Secure Web Database and SHA-3 Password Authentication
An access control system based on a secret sharing scheme that uses fingerprint authentication requires increased security for the database and its connections. Attacks that often occur on RFID storage and web database systems are card copying, data theft and leaks, and man-in-the-middle attacks. Th...
Saved in:
Published in | 2021 6th International Workshop on Big Data and Information Security (IWBIS) pp. 145 - 152 |
---|---|
Main Authors | , , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
23.10.2021
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | An access control system based on a secret sharing scheme that uses fingerprint authentication requires increased security for the database and its connections. Attacks that often occur on RFID storage and web database systems are card copying, data theft and leaks, and man-in-the-middle attacks. The AES-256 algorithm with an SHA-3 password key is implemented in web database encryption. The SSL VPN is also applied for securing the connection by internet lines. It is experimentally proven that the access control system can overcome the man-in-the-middle attack and the data theft. The success rate for login is up to 65%. The average time required for the enrollment process is 29.64 seconds while for the login process is 30.79 seconds. |
---|---|
DOI: | 10.1109/IWBIS53353.2021.9631847 |