skip to main content
10.1145/3591156.3591158acmotherconferencesArticle/Chapter ViewAbstractPublication PagesivspConference Proceedingsconference-collections
research-article

Access Control, Biometrics, and the Future

Published:16 June 2023Publication History

ABSTRACT

Access control is the process of protecting resources by allowing or rejecting access to particular resources. It is an integral part of physical security systems and protects resources from unauthorized use. Over the past decade, there has been a huge demand and need for more sophisticated and secure access technologies. Scientists are developing cutting edge technologies to fulfill the requirements for secure access control experiences. Access control systems, using the latest biometric technologies such as fingerprint, facial recognition, iris recognition, DNA, and signature recognition have offered a higher level of security than the conventional systems. Biometrics plays a vital role in the identification and authentication phase of access control. Every biometric system has weaknesses and benefits. The system success depends on selecting the proper type of biometric modality to use and understanding how it affects system performance, cost, and limitations. Fingerprint holds the first place according to its popularity but facial recognition and iris recognition continue to grow for its accuracy and are considered as the future of biometric recognition. Besides biometric technology, other future possibilities for secure access control are- mobile access control, cloud-based security, and multi-factor authentication. This paper presents access control components, functions, and types. The aim of the paper is to discuss and analyze the latest biometric access control to secure sensitive information. This paper also provides an overview of access control, discusses the latest biometric technology, and presents the future trend of access control.

References

  1. Alper Kerman, Oliver Borchert, Scott Rose, and Allen Tan, 2020. Implementing a zero trust architecture. National Institute of Standards and Technology, 2020, pp.17-17.Google ScholarGoogle Scholar
  2. Htoo Aung Maw, Hannan Xiao, Bruce Christianson, and James A. Malcolm. 2014. A survey of access control models in wireless sensor networks. Journal of Sensor and Actuator Networks, 3(2), pp.150-180.Google ScholarGoogle ScholarCross RefCross Ref
  3. Sabrina Sicari, Alessandra Rizzardi, Luigi Alfredo Grieco, and Alberto Coen-Porisini. 2015. Security, privacy and trust in Internet of Things: The road ahead. Computer networks, 76, pp.146-164.Google ScholarGoogle Scholar
  4. Md L. Ali, Kutub Thakur, and Muath A. Obaidat. 2022. A Hybrid Method for Keystroke Biometric User Identification. Electronics, 11(17), p.2782.Google ScholarGoogle ScholarCross RefCross Ref
  5. Aafaf Ouaddah, Hajar Mousannif, Anas Abou Elkalam, and Abdellah Ait Ouahman. 2017. Access control in the Internet of Things: Big challenges and new opportunities. Computer Networks, 112, pp.237-262.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Md L. Ali, John V. Monaco, Charles C. Tappert, and Meikang Qiu. 2017. Keystroke biometric systems for user authentication. Journal of Signal Processing Systems, 86(2), pp.175-190.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Nataliya B Sukhai. 2004, October. Access control & biometrics. In Proceedings of the 1st annual conference on Information security curriculum development (pp. 124-127).Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Md L. Ali and Charles C. Tappert. 2018, August. Pohmm/svm: A hybrid approach for keystroke biometric user authentication. In 2018 IEEE International Conference on Real-time Computing and Robotics (RCAR) (pp. 612-617). IEEE.Google ScholarGoogle Scholar
  9. Dean Povey. 1999, September. Optimistic security: a new access control paradigm. In Proceedings of the 1999 workshop on New security paradigms (pp. 40-45).Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Younis A Younis, Kashif Kifayat, and Madjid Merabti. 2014. An access control model for cloud computing. Journal of Information Security and Applications, 19(1), pp.45-60.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Carl E. Landwehr. 1981. Formal models for computer security. ACM Computing Surveys (CSUR), 13(3), pp.247-278.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Di Vimercati De Capitani, Sabrina, Sara Foresti, Pierangela Samarati, and Sushil Jajodia. 2007. Access control policies and languages. International Journal of Computational Science and Engineering, 3(2), pp.94-102.Google ScholarGoogle Scholar
  13. Anil K. Jain and Ajay Kumar. 2010. Biometrics of next generation: An overview. Second generation biometrics, 12(1), pp.2-3.Google ScholarGoogle Scholar
  14. Sharifah Mumtazah Syed Ahmad, Borhanuddin Mohd Ali, and Wan Azizun Wan Adnan. 2012. Technical issues and challenges of biometric applications as access control tools of information security. International journal of innovative computing, information and control, 8(11), pp.7983-7999.Google ScholarGoogle Scholar
  15. Vincent C. Hu, David Ferraiolo, and D. Richard Kuhn. 2006. Assessment of access control systems. Gaithersburg, MD, USA: US Department of Commerce, National Institute of Standards and Technology.Google ScholarGoogle Scholar
  16. Md Liakat Ali, John V. Monaco, and Charles C. Tappert. 2017, October. Biometric studies with hidden Markov model and its extension on short fixed-text input. In 2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON) (pp. 258-264). IEEE.Google ScholarGoogle Scholar
  17. Mark Ciampa, 2021. CompTIA security+ guide to network security fundamentals. Cengage Learning.Google ScholarGoogle Scholar
  18. NordPass, Top 200 most common password, Retrieved December 27, 2022 from https://nordpass.com/most-common-passwords-list/.Google ScholarGoogle Scholar
  19. David Kim and Michael G. Solomon. 2021. Fundamentals of information systems security. Jones & Bartlett Learning.Google ScholarGoogle Scholar
  20. Ramaswamy Palaniappan and Kenneth Revett. 2014. PIN generation using EEG: a stability study. International Journal of Biometrics, 6(2), pp.95-106.Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Michael Gips, Access Control Trends in 2022: The Future of Access Control, Retrieved December 27, 2022 from https://www.swiftlane.com/blog/the-future-of-access-control/.Google ScholarGoogle Scholar
  22. Future Market Insights, Contactless Biometrics Technology Market, Retrieved December 27, 2022 from https://www.futuremarketinsights.com/reports/contactless-biometrics-technology-market.Google ScholarGoogle Scholar
  23. Marketsandmarkets, Facial Recognition Market, Retrieved December 27, 2022 from https://www.marketsandmarkets.com/Market-Reports/facial-recognition-market-995.html.Google ScholarGoogle Scholar
  24. Scot Sturges, The ever-Evolving Trends of Access Control, Various Challenges are driving new technology adaptions for traditional access control, Security Infowatch, June 12, 2022. Retrieved December 27, 2022 from https://www.securityinfowatch.com/access-identity/access-control/article/21268269/the-everevolving-trends-of-access-control.Google ScholarGoogle Scholar
  25. Tansu Alpcan and Tamer Basar. 2004, December. A game theoretic analysis of intrusion detection in access control systems. In 2004 43rd IEEE Conference on Decision and Control (CDC)(IEEE Cat. No. 04CH37601) (Vol. 2, pp. 1568-1573). IEEE.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Access Control, Biometrics, and the Future

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          IVSP '23: Proceedings of the 2023 5th International Conference on Image, Video and Signal Processing
          March 2023
          207 pages
          ISBN:9781450398381
          DOI:10.1145/3591156

          Copyright © 2023 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 16 June 2023

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Research
          • Refereed limited
        • Article Metrics

          • Downloads (Last 12 months)99
          • Downloads (Last 6 weeks)14

          Other Metrics

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format .

        View HTML Format