Access Control System based on Secret Sharing Scheme with Secure Web Database and SHA-3 Password Authentication

An access control system based on a secret sharing scheme that uses fingerprint authentication requires increased security for the database and its connections. Attacks that often occur on RFID storage and web database systems are card copying, data theft and leaks, and man-in-the-middle attacks. Th...

Full description

Saved in:
Bibliographic Details
Published in2021 6th International Workshop on Big Data and Information Security (IWBIS) pp. 145 - 152
Main Authors Tillah, Alivia Maraqonita, Ogi, Dion, Febriyanto, Mohammad, Farhatin, Devi Asria
Format Conference Proceeding
LanguageEnglish
Published IEEE 23.10.2021
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:An access control system based on a secret sharing scheme that uses fingerprint authentication requires increased security for the database and its connections. Attacks that often occur on RFID storage and web database systems are card copying, data theft and leaks, and man-in-the-middle attacks. The AES-256 algorithm with an SHA-3 password key is implemented in web database encryption. The SSL VPN is also applied for securing the connection by internet lines. It is experimentally proven that the access control system can overcome the man-in-the-middle attack and the data theft. The success rate for login is up to 65%. The average time required for the enrollment process is 29.64 seconds while for the login process is 30.79 seconds.
DOI:10.1109/IWBIS53353.2021.9631847