JIS  Vol.6 No.2 , April 2015
Security & Privacy Implications in the Placement of Biometric-Based ID Card for Rwanda Universities
ABSTRACT
Biometric authentication systems are believed to be effective compared to traditional authentication systems. The introduction of biometrics into smart cards is said to result into biometric-based smart ID card with enhanced security. This paper discusses the biometric-based smart ID card with a particular emphasis on security and privacy implications in Rwanda universities environment. It highlights the security and implementation issues. The analysis shows that despite the necessity to implement biometric technology, absence of legal and regulatory requirements becomes a challenge to implementation of the proposed biometric solution. The paper is intended to engage a broad audience from Rwanda universities planning to introduce the biometric-based smart ID cards to verify students and staff for authentication purpose.

Cite this paper
Harinda, E. and Ntagwirumugara, E. (2015) Security & Privacy Implications in the Placement of Biometric-Based ID Card for Rwanda Universities. Journal of Information Security, 6, 93-100. doi: 10.4236/jis.2015.62010.
References
[1]   ITU-T Newslog (2009) Technology Watch Report: Biometrics and Standards.

[2]   Liu, S. and Silverman, M. (2002) A Practical Guide to Biometric Technology. IT Professional, 3, 27-32.
http://dx.doi.org/10.1109/6294.899930

[3]   Pato, J.N. and Millett, L.I. (2010) Biometric Recognition: Challenges and Opportunities. Whither Biometric Board.
http://dataprivacylab.org/TIP/2011sept/Biometric.pdf

[4]   Jain, A., Bolle, R. and Pankanti, S. (2002) Biometrics: Personal Identification in Networked Society. Kluwer Academic Publishers, Forth Printing.

[5]   Bosworth, S. and Kabay, M.E. (2009) Computer Security Handbook. 4th Edition, John Wiley & Sons Inc., Hoboken.

[6]   Robinson, S. and Stonecypher, L. (2011) Using Biometry for Security and Identification. Bright Hub.
http://www.brighthub.com/computing/smb-security/articles/63325.aspx

[7]   Sanderson, C. (2008) Biometric Person Recogntion: Face, Speech and Fussion. Chapter 3. VDM Verlag, Saarbrücken.

[8]   Nalwa, V. (1997) Automatic On-Line Signature Verification. Proceedings of the IEEE, 85, 213-239.
http://dx.doi.org/10.1109/5.554220

[9]   Boreki, G. and Zimmer, A. (2004) Hand Geometry Feature Extraction through Curvature Profile Analysis. UNICENP, Computer Engineering Department.

[10]   Prabhakar, S., Pankat, S. and Jain, A.K. (2003) Biometric Recognition: Security and Privacy Concern. IEEE Transactions on Security & Privacy, 1, 33-42.

[11]   Cavoukian, S. (2008) Access and Privacy Excellence…20 Years in the Making. Information and Privacy Commissioner of Ontario.
https://www.ipc.on.ca/images/Resources/20-20book_374675128750.pdf

[12]   Sanger, D.E. (2015) Report Find No Substitution for Mass Data Collection.
http://www.nytimes.com/2015/01/16/us/politics/report-finds-no-alternative
-to-bulk-collection-of-phone-data.html?_r=2


[13]   Maltoni, D., Maio, D., Ain, A.K. and Prabhakar, S. (2009) Handbook of Finger Print Recognition. 2nd Edition, Springer-Verlag, London, 51-57.

[14]   Wadhwa, K.R. and Meister, M. (2004) Biometrics and Privacy. Faulkner Information Services.
http://www.biometricgroup.com/in_the_news/biopri3.pdf

[15]   Gregory, P. and Simon, M.A. (2008) Biometrics for Dummies. Wiley Publishing, Inc., Indianapolis, 271-277.

[16]   Dorizzi, B. (2005) Biometrics at Frontiers, Assessing the Impact on Society Technical Impact of Biometrics.
http://researchweb.iiit.ac.in/~vandana/PAPERS/BASIC/biometric_challenges.pdf

[17]   Ashbourn, J. (2014) Biometrics in the World: The Cloud, Mobile Technology and Pervasive Identity. Springer International Publishing, Berlin, 62-72.

[18]   Bidgoli, H. (2006) Handbook of Information Security, Threats, Vulnerabilities, Prevention and Management. Volume 3, John Wiley & Sons, Inc, Hoboken, 473-478.

[19]   Xiao, Q. and Savastano, M. (2007) An Exploration on Security and Privacy Issues of Biometric Smart ID Cards. Proceedings of the IEEE SMC Information Assurance and Security Workshop, West Point, 20-22 June 2007, 228-233.

[20]   Vielhauer, C., Dittmann, J., Drygajlo, A., Juul, N.C. and Fairhurt, M. (2011) Biometrics and ID Management. Proceedings of the COST2101 European Workshop, Brandenburg (Havel), 8-10 March 2011, 1-3.
http://www.springer.com/gp/book/9783642195297

[21]   Kolan, H. and Thapaliya, T. (2011) Biometric Passport: Security and Privacy Aspects of Machine Readable Travel Document.
https://diuf.unifr.ch/main/is/sites/diuf.unifr.ch.main.is/files/documents/student-projects/
eGov_2011_Hesam_Kolahan_&_Tejendra_Thapaliya.pdf

[22]   United States General Accounting Office (2002) Technology Assessment: Using Biometrics for Border Security.
http://www.gao.gov/new.items/d03174.pdf

[23]   Ashbourn, J. (2000) Biometrics: Advanced Identity Verification: The Complete Guide. Springer-Verlag, London, 1-6.

[24]   El-Abed, M., Giot, R., Hemery, B. and Rosenberger, C. (2010) A Study of Users’ Acceptance and Satisfaction of Biometric Systems.
http://www.pchocolaad.com/research/Biometrie%20-%20User%20Acceptance.pdf

[25]   Patrick, A.S. (2008) Fingerprint Concerns: Performance, Usability, and Acceptance of Fingerprint Biometric Systems.
http://www.andrewpatrick.ca/essays/fingerprint-concerns-performance-usability-and-
acceptance-of-fingerprint-biometric-systems


[26]   Du, Y. (2013) Biometrics: From Fiction to Practice. Pan Stanford Publishing Pte Ltd., Singapore, 11.

 
 
Top