Role Based Access Control Using Biometric the in Educational System

Authors

  • Maha K. Kabier Department of Computer Science, College of Education for Pure Sciences, University of Basrah, Basrah, Iraq
  • Ali A. Yassin Department of Computer Science, College of Education for Pure Sciences, University of Basrah, Basrah, Iraq
  • Zaid A. Abduljabbar Department of Computer Science, College of Education for Pure Sciences, University of Basrah, Basrah, Iraq.
  • Songfeng Lu Shenzhen Huazhong University of Science and Technology Research Institute, Shenzhen, China

DOI:

https://doi.org/10.56714/bjrs.49.1.8

Keywords:

E-learning, Fingerprint, Biometrics, Multifactor Adaptive Authentication Techniques, Asymmetric Scalar Product Preserving Encryption

Abstract

The purpose of a secure e-learning system based on cloud computing is to allow instructors and students to access their accounts at any time and from anywhere. These types of systems work to ensure that their users (instructors and students) are truly enrolled in the school or institute to prevent unauthorized users from accessing the resources and components of the system. Furthermore, the traditional authentication techniques used in the majority of educational systems suffer from several issues, such as cyber security attacks and weak management of resources. So, some students could be eager to take advantage of such a system's flaw in an effort to cheat. User authentication and end-user monitoring are more difficult in this situation. Multifactor adaptive authentication techniques are used to implement a system with simultaneous authentication. The proposed scheme system offers an effective, affordable, and human intervention-adaptive authentication and monitoring solution for e-learning environments. Additionally, our work can resist cyber security and contains some good metrics like mutual authentication, user anomalies, and others. In this paper, the proposed scheme system uses a two-factor authentication system based on Asymmetric Scalar Product Preserving Encryption (APSE) and fingerprint biometrics for managing and generating a user's account in a secure way. Our work also achieves a good balance between performance and security complexity compared to the state-of-the-art. So, we achieve good results for 1.69 ms for computation and 1280 bits for communication.

Downloads

Download data is not yet available.

References

Montazer, G. Ali, Y. K. Al-Rikabi, International Conference on Web Research (ICWR), 34 (2021).

Q. Alajmi, R. A. Arshah, A. Kamaludin, A. S. Sadiq, M. A. Al-Sharafi, Electr. Comput. Technol.2018(6),9(2017).

https://cloud.google.com/blog/products/containers-kubernetes/exploring-container-security-the-shared-responsibility-model-in-gke-container-security-shared-responsibility-model-gke.

Q. Alajmi, A. S. Sadiq, A. Kamaludin, M. A. Al-Sharafi, Adv. Sci. 24(6), 4044 ( 2018).

Z. A. Hussien, Z. A. Abduljabbar, M. A. Hussain, M. A. Al Sibahee, S. Lu, H. A. A. Al-Asadi. CSAE, 155( 2019).

M. A. Al Sibahee, S. Lu, Z. A. Abduljabbar, A. Ibrahim, Z. A. Hussien, K. A. Mutlaq, M. A. Hussain. International Journal of Distributed Sensor Networks 14, 2 (2018).

A. A.Yassin, Z. N. Hikmat, Z. A. Abduljabbar, H. Sh. Hashim. International Journal of Engineering and Advanced Technology 1, 133 (2013).

S. Subashini, V. Kavitha, Netw. Comput. Appl., 34(1), 11( 2011).

M. Zhou, R. Zhang, W. Xie, W. Qian, A. Zhou, Conf. Semant. Knowl. Grid, 112(2010).

M. Abdalla, D. Pointcheval, Notes Comput. Sci. 3376(1), 208(2005).

Kamesh, N. Sakthi Priya, Secur. Commun. Networks, 5,(1), 437(2012).

K. Upendra, S. Singh, V. Kumar, H. K. Verma, Med. Eng. Technol., 31(1), 45(2007).

M. Abdalla, M. Izabach, D. Pointcheval, International Conference, CANS 2008(7), 148(2008).

A. A. Yassin, H. Jin, A. Ibrahim, W. Qiang, D. Zou, International Parallel and Distributed Processing Symposium Workshops, 1217( 2016).

A. Alsadoon, L. Pham, A. Elchouemi, International Conference on Advances in Electrical, 16(2017).

A. Majmaah, International Journal of Advanced Computer Science and Applications, 8(10), 11(2017).

S. Ennouamani, Z. Mahani, L. Akharraz, Education and Information Technologies, (2020).

A. Zamfiroiu, D. Constantinescu, M. Zurini, C. Toma, Appl. Sci., 10(21), 13(2020).

M. Labayen, R. Vea, J. Florez, N. Aginako, B. Sierra, IEEE Access, 9, 72411(2021).

D. K. R. Oluwayimika, Trendy Res. Eng. Technol, 7(1), 23(2022).

A. Abdellaoui, Y. I. Khamlichi, H. Chaoui, Procedia Comput. Sci, 85(9), 300( 2016).

M. Sumagita, I. Riadi, Cyber-Security Digit. Forensics, 7(4), 381(2018).

C. J. F. Cremers, International Conference, 7(20), 418(2008).

K. Kryszczuk, A. Drygajlo, P. Morier, Signal Pro-cessing Institute,(5), 88(2004).

H. I. Nasser, M. A. Hussain. G. Honi, Comput. Sci, 30(3), 628(2022).

S. Movassaghi, M. Abolhasan, J. Lipman, D. Smith, A. Jamalipour, IEEE Commun. Surv. Tutorials,16(3),1686(2014) .

S. Majumder, T. Mondal, M. J. Deen, Sensors, 17(1), 130(2017).

H. H. Kilinc, T. Yanik, IEEE Commun. Surv. Tutorials, 16(2), 1023(2014).

S. Khatoon, S. M. M. Rahman, M. Alrubaian, A. Alamri, IEEE Access, 7, 47971(2019).

A. Ostad-Sharif, D. Abbasinezhad-Mood, M. Nikooghadam, Commun. Syst., 32(5), 23(2019).

C. C. Yang, R. C. Wang, W. T. Liu, Comput. Secur, 24(5), 386(2005).

L. Wu, Y. Zhang, F. Wang, Comput. Stand. Interfaces, 31(2), 291(2009).

E. J. Yoon, K. Y. Yoo, Notes Comput. Sci, 4(3), 507(2006).

Downloads

Published

30-06-2023

How to Cite

Kabier, M. K., Yassin, A. A., Abduljabbar, Z. A., & Lu, S. (2023). Role Based Access Control Using Biometric the in Educational System. Basrah Researches Sciences, 49(1), 85–101. https://doi.org/10.56714/bjrs.49.1.8

Issue

Section

Articles

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Most read articles by the same author(s)