Browse > Article
http://dx.doi.org/10.12673/jkoni.2013.17.3.314

Secure User Authentication Scheme Based on Facial Recognition for Smartwork Environment  

Byun, Yun-Sang (ISAA Lab. Department of Information Security Engineering Soonchunhyang University)
Kwak, Jin (Department of Information security Engineering, Soonchunhyang University)
Abstract
Smartwork is future-oriented work-environment to bring swift business transaction and convenient for users. In domestic and foreign various countries, It's already prompting introduction of smartwork. Users process work to access frequently from the outside in smartwork that's a similar client/server environment to existing Cloud Computing environment. Necessary of user authentication is increasing to be solvable to security vulnerability because there is possibility that malware flows in and leaks company's confidential information by unauthorized users especially in smartwork environment. Therefore we propose User Authentication scheme based face recognition is applicable to smartwork environment to analyze established User Authentication scheme. environment.
Keywords
Smartwork; User Authentication; Facial Recognition; Secure Smartwork;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 S.K. Park, J.H. Lee, "Smarwork Technology and Standardization", Telecommunications Technology Assocition Journal, Vol. 136, pp.79-84
2 M.S Jeong, D.B Lee, J. Kwak, "Analysis of Smartwork Security Threats and Security Requirements", Korea Institute of Information Security & Cryptology, Journal of Information Security, Vol. 21 No. 5, pp55-63, 2011.
3 K.H, Lee, "Facial Recognition Technology Trends"
4 L. Lamport, "Password Authentication with Insecure Communication", Communications of ACM 24, Vol. 24. No.11. pp. 770-772, Nov. 1981.   DOI   ScienceOn
5 M.S. Hwang, L.H. Li, "A New Remote User Authentication Scheme Using Smart Cards", IEEE Transactions on Consumer Electronics Vol. 46. No. 1 pp. 28-.30. Feb. 2000.   DOI   ScienceOn
6 M.K. Khan, S.K. Kim, "Cryptanalysis and Security Enhancement of a 'more Efficient & Secure Dynamic ID-based Remote User Authentication Scheme', Computer Communications, Vol. 34, pp. 305-309, 2011.   DOI   ScienceOn
7 M. Scott, "Cryptanalysis of an ID-based Password Authentication Scheme Using Smart Cards and Fingerprints", ACM SIGOPS Operating Systems Review, 2004.
8 I. E. Liao, C. C. Lee, M. S, Hwang, "A Password Authentication Scheme Over Insecure Networks", Journal of Computer and System Sciences, Vol. 72, pp. 727-740, 2006.   DOI   ScienceOn
9 S. Lee, I. Ong, H. T. Lim, H. J. Lee, "Two Factor Authentication for Cloud Computing", International journal of KIMICS, Vol. 8, No. 4, pp. 427-432, Aug. 2010