Professional Documents
Culture Documents
One of the current technologies that can be used to manage multiple identities and roles is
Role Based access control model. Role based model identifies and grants access to users
based on their assigned role. In relation to the MPS case study each role can attain different
function and according to their responsibilities each user is given their relevant role hence,
reducing the job of the administrators (Longying & Chunyu 2011). One of the MPS
requirements is to control legitimate access to data, this model is a form of non discretionary
access control in the sense that the users are inevitably limited to the organization's protection
policy (Ferraiolo et al 2012).
The figure below shows different users can perform various actions in different roles. A user
can have different job roles and a role can be associated with one or more users. The actions
are usually imposed by the organisation, for instance in the MPS system a policeman is
associated with different roles and performs various operations within those roles.
Sessions
RBAC provides the administrators with the capability to control what actions users can
perform, when they can perform these actions and the conditions. It meets the MPS
requirement as it is known to have flexible, reliable easily accessible and controls access to
data effectively (Zhu, et al., 2012).
Single Sign-on
Another technology that can be implemented in the MPS system is the Single sign-on
method. This method deals with issues relating to having multiple identities and allows
users provide their login details once and remain authorised all through the day. In addition, a
user can access various resources needed to perform different roles without having to supply
different credentials.
This is suitable for the MPS as it provides easy access for users and also administrators are
able to control one system that is in charge of all access requests (Harris, 2003). Furthermore,
it improves productivity in the sense that, users would have access to all applications,
programs, files needed to complete their task by signing in just once. Users would be able to
move around different applications or data without authenticating themselves numerous
times. It is secure as users are limited and would have access to only legitimate data.
Biometric techniques are ways of identifying, distinguishing and verifying a human identity
by analyzing and measuring the biological information of a person. It is used to identify a
person by their biological attributes (Moi, et al., 2010). Biometric techniques can be used to
strengthen user authentication in the MPS through a method called biometric authentication.
Biometric authentication is a process of confirming identity by using the physical or
behavioural characteristics of a user such as face, iris, fingerprint, vein, signature, voice, etc
(Xiuyan, et al., 2011) . This technique also increases user accessibility, it eliminates the issue
of forgotten passwords strengthens the security relative to passwords, reduces errors during
identification (Moi, et al., 2009). Biometric techniques play a very important role in user
authentication as it is reliable because it is hard to compromise a person's biometrics than
passwords. Furthermore, this will strengthen the security weakness related to having multiple
passwords. In relation to the MPS case study, the use of biometrics for user authentication
will strengthen the security of their system by ensuring only authorised staff have access to
their assigned data.
Fingerprint Method
Fingerprint recognition is a personal identification technique that is used for verification and
identification. To verify, it compares an input fingerprint to a particular user to determine if
they match. For identifying, it compares the input finger with the database to verify that there
is no duplicate or false identity. Furthermore, because the fingerprint technique uses unique
features on a person's finger it can be used for access control in the MPS system. It is also
suitable at workstation level by requiring users to use their fingerprint to get into the system
in order to access data needed to perform daily duties. Some of the advantages of using this
technique for the mps system are; users are unable to share their fingerprint unlike passwords.
In terms of usability, it is convenient - no need to remember passwords or codes. In terms of
scalability, it is scalable enough as the authentication is at workstation level so there will not
be issues of time wasting or queue. This technique has been greatly relied on and has proven
reliable in many identity management and access control applications around the world (Jain,
et al., 2010). This method can also adopt a template free technique called ''cancellable
fingerprint''. Here the biometric is transformed using a one way function where the location
and orientation of the minutiae that are stored are transformed permanently (Ratha, et al.,
2007)
Iris Recognition
This technique uses pattern recognition algorithms to extract the distinctive pattern of
iris and encode it into a template. The iris is a very unique feature in a human which makes it
one of the most reliable techniques for authentication. One of its advantages is that the eye
remains stable over time and in different environmental conditions. It also possesses a high
degree of randomness and also able to identify a person without any physical contact
(Chowhan & Shinde, 2008). It can also be used as a template free biometric by distorting the
iris pattern using a non-invertible transform (Jinyu, et al.,2008) . This technique is suitable for
the MPS system as it is unique, users would have access to only the systems they have
privileges to and it makes it difficult for a user to replicate an iris for authentication.
According to (Khaw, 2002) this technique is known to have low error rates, high speed and
scalability and it is also very reliable for user authentication.
There are some drawbacks associated with template biometric such as recreating a biometric
image from the original, updating and reissuing the template is difficult once it has been
compromised. To prevent issues such as stealing of the biometric template, template free
biometric technologies have been introduced. This is a process whereby keys are generated
from characteristics in the biometric data and compared with a threshold. Furthermore, all the
keys from the features are cascaded together and an encryption key is generated (Weiguo, et
al., 2008). One advantage of using this is that the key would only be reproduced only if the
correct biometric sample has been confirmed and the result of this is a key or an error
message. In template free biometrics, there is no storage of biometric image that is, it does
not make use of a template. Also the original template cannot be recreated from the stored
information. However, in the event that a biometric encryption has been stolen, the
techniques used allow for it to be cancelled which enhances authentication and security of
data. (Cavoukian & Snijder, 2009).
Biological identity refers to the physiological features of a person for example face, eyes,
colour that differentiates them in a physical environment. Digital identity is a subset of the
identity of an entity which is expressed in an electronic format. Furthermore, a person can use
a computer to create an identity for themselves on the internet. An individual usually has
many digital identities which can be unique .
With an illustration to a member of a police computer crime unit who engages in other police
duties when not involved in his unit's work. In a scenario where the policeman is not in his
unit a digital identity will be used such as his user-id, password for authentication and
identification since he isn't physically present at his unit and his identification will be
represented in a digital format. However, when a policeman is in his crime unit majority of
his tasks will be completed on his computer. Biological identity such as fingerprint, iris
recognition will be used since his identification can be made through his/her physiological
features in the unit. In summary, a policeman involved in different roles will require a
different identity for authentication and identification depending on the duty he/she is
performing.
This joins public keys to entities by using a public key that is widely available and a private
key that is known to only the application or individual that owns the keys. Furthermore, other
individuals or entities can verify public key bindings by using PKI. In client server
messaging, security of information is critical. Asides using public and private key, it also uses
a certificate authority which is a trusted third party that issues digital certificate used to
identify users. Furthermore, it used the secure socket layer which uses a secure and encrypted
channel for transfer of messages (Lock & Sommerville, 2002).
One of the advantages of PKI is that the private keys cannot be shared or determined from
the public key. Furthermore, in client server messaging the use of PKI ensures that the client
and server are who they claim to be thereby confirming that an individual executed a specific
action The use of encryption also makes the process more secure that is, the information
being exchanged is private (Polk, 2005).
PKI uses a cryptographic algorithm to generate its public and private key. The length of these
two numbers determines the strength of the algorithm. For instance using a 128bit key, with
enough computing power it would take a very long time to check all the possible
combinations. In other words, the shorter the length of the bit used to generate the keys the
higher the likelihood of the algorithm being broken by checking every possible key
combination. Furthermore it's practically impossible to discover a private key from a public
key using RSA encryption therefore this makes this algorithm one of the most secure.
However, every system is vulnerable to attacks as there is no perfect system or a system with
100% security. It could be said that PKI is practically unbreakable when properly installed
that is using a long bit length keys making it hard to determine the combination (Milanov,
2009).
RSA be trusted ?
MPS can trust RSA which is an algorithm used as part of PKI because the security of RSA
depends on the complexity of factorising the set of prime numbers. In the sense that, as long
as the length of the keys is large, it would be difficult for the attack to be feasible. If this
condition is satisfied then MPS can be sure that any information being accessed is done by
the authorised staff. Furthermore, encryption keys are public however the decryption keys are
not therefore an individual can only decrypt a message if he/she has the decryption key. In
information exchange, digital signatures are a way to verify that information is from a
particular sender using the appropriate keys. One advantage of using this algorithm is the
ability to identify and verify who accessed or sent an information. MPS can trust RSA as it
uses a public-key cryptosystem that allows secure communications and digital signatures
(Milanov, 2009).
References :
Cavoukian, A., Snijder, M., 2009. The Relevance of Untraceable Biometrics and Biometric
Encryption: A Discussion of Biometrics for Authentication Purposes [pdf] Available at:
<http://www.ipc.on.ca/images/Resources/untraceable-be.pdf> [Accessed 13 November 2013]
Gerck, Ed., 2000. Overview of Certification Systems: X.509, PKIX, CA, PGP [pdf] Available at :
< http://www.thebell.net/papers/certover.pdf > [Accessed 6 November 2013
Harris, S., 2003 ''Mike Meyers' CISSP Certification Passport'' [pdf] McGraw-Hill Available
at: <http://www.mhprofessional.com/downloads/products/0072225785/0072225785_ch02.pdf>
[Accessed 6 November 2013]
Jain K, Feng J, Nandakumar K 2010 ''Fingerprint Matching'' [pdf] IEEE Computer society
Available at:
<http://biometrics.cse.msu.edu/Publications/Fingerprint/JainFpMatching_IEEEComp10.pdf >
[Accessed 29 October 2013]
Jinyu Zuo; Ratha, N.K.; Connell, J.H., "Cancelable iris biometric," Pattern Recognition,
2008. ICPR 2008. 19th International Conference on , vol., no., pp.1,4, 8-11 Dec. 2008
[Accessed 28 November 2013]
Khaw, P., 2002. Iris Recognition Technology for Improved Authentication [online] Sans
Institute Available at: <https://www.sans.org/reading-room/whitepapers/authentication/iris-
recognition-technology-improved-authentication-132> [Accessed 29 October 2013]
Li Xiuyan; Miao Changyun; Liu Tiegen; Yuan Chenhu, "Research on Personal Identity
Verification Based on Hand Vein Iris and Fingerprint," Computer Science and Society
(ISCCS), 2011 International Symposium on , vol., no., pp.16,19, 16-17 July 2011 [Accessed
29 October 2013]
Lock, R., Prof Sommerville, I., 2002. Grid Security and its use of X.509 Certificates [pdf]
Available at:
<http://www.comp.lancs.ac.uk/computing/research/cseg/projects/dirc/papers/gridpaper.pdf >
[Accessed 6 November 2013]
Longying Lian; Chunyu Song, "Research of RBAC access control model based on LDAP
tree storage," Electronic and Mechanical Engineering and Information Technology (EMEIT),
2011 International Conference on , vol.3, no., pp.1363,1365, 12-14 Aug. 2011 [Accessed 4
November 2013]
Moi, S.H.; Saad, Puteh; Rahim, N.A.; Ibrahim, S., "Error Correction on IRIS Biometric
Template Using Reed Solomon Codes," Mathematical/Analytical Modelling and Computer
Simulation (AMS), 2010 Fourth Asia International Conference on , vol., no., pp.209,214, 26-
28 May 2010 [Accessed 29 October 2013]
Moi, S.H.; Rahim, N.B.A.; Saad, Puteh; Sim, P.L.; Zakaria, Z.; Ibrahim, S., "Iris Biometric
Cryptography for Identity Document," Soft Computing and Pattern Recognition, 2009.
SOCPAR '09. International Conference of , vol., no., pp.736,741, 4-7 Dec. 2009 [Accessed
29 October 2013]
Polk, T., 2005. Introduction to Public Key Infrastructure [pdf] Available at:
<http://www.ncvhs.hhs.gov/050113p3.pdf > [Accessed 8 November 2013]
Ratha, N.K.; Chikkerur, S.; Connell, J.H.; Bolle, R.M., "Generating Cancelable Fingerprint
Templates," Pattern Analysis and Machine Intelligence, IEEE Transactions on , vol.29, no.4,
pp.561,572, April 2007 [Accessed 28 November 2013]
Rui-Feng Zhu; Jie Ning; Pei Yu, "Application of role-based access control in information
system," Wavelet Active Media Technology and Information Processing (ICWAMTIP), 2012
International Conference on , vol., no., pp.426,428, 17-19 Dec. 2012 [Accessed 4 November
2013]
Weiguo Sheng; Howells, G.; Fairhurst, Michael; Deravi, F., "Template-Free Biometric-Key
Generation by Means of Fuzzy Genetic Clustering," Information Forensics and Security,
IEEE Transactions on , vol.3, no.2, pp.183,191, June 2008 [Accessed 30 October 2013]