Site Logo E-PROJECTTOPICS

DESIGN AND IMPLEMENTATION OF CLAIM BASED BIOMETRIC AUTHENTICATION SYSTEM OVER THE CLOUD


By


Osman Mirghani Osman Elsayed



Presented To


Computer Science Department

πŸ“„ Pages: 100       🧠 Words: 14937       πŸ“š Chapters: 5 πŸ—‚οΈοΈ For: PROJECT

πŸ‘οΈβ€πŸ—¨οΈοΈοΈ Views: 402      

⬇️ Download (Complete Report) Now!

πŸ“₯ Instant Access: Download the fully developed, tested, and ready-to-use software that matches this project topic. Save weeks of effort and get the complete working solution immediately. Trusted by students & professionals, with fast delivery guaranteed.

Get Developed Software

πŸ‘¨β€πŸ’» Hire a Software Developer: Work with an experienced software engineer who can customize, improve, or build your project from scratch. Get professional coding, tailored features, and expert guidance to make your project stand out. 100% reliable service, with proven results and client satisfaction.

Hire a Software Developer
ABSTRACT 
 
In spite of their widespread use and ubiquity, passwords are unreliable as an 
authentication methodology because they can be hacked or even guessed, yet when it comes to 
biometrics it is very hard to impersonate someone. Therefore, biometric authentication schemes 
are currently widely recognized as the strongest authentication technologies available on the 
market. 
  Identity providers and claims-based identity  are  emerging technologies that aims to 
decouple the authentication logic from the applicationÒ€s business logic. This can be done by 
assigning the authentication task to the identity provider and establishing a trust relationship 
between the application and the identity provider so that the application relies on the identity 
provider to authenticate the application users. 
  The project aims to develop an identity provider that uses fingerprint  and facial 
biometrics to authenticate users. The identity provider task is to determine the identity of the user 
and pass the identity information to the relying applications which trust this identity provider. 
  For security purposes, the biometrics data of users is stored on a local server within the 
sponsoring companyÒ€s intranet. This local server is located behind firewalls and itÒ€s address can 
only be resolved internally within the intranet due to use of NAT. Therefore, the server doesnÒ€t 
have a global  IP address. Windows Azure cloud platform has a powerful component called 
Ò€œWindows Azure Service BusΓ’β‚¬Â which was used to solve this tough connectivity problem. 
  The project also aims to develop a simple employees management application that can be 
used as an example of a relying application that relies on the developed identity provider to 
authenticate the users. 
  Project management principles and software development lifecycle techniques were 
applied during the project implementation. This approach has significantly streamlined the 
project implementation process and the project objectives have been met. 
TABLE OF CONTENTS 
 
DICLARATION OF ORIGINALITY   - -  ii 
ABSTRACT   - - - ..  iii 
صÙβ€žØ®ØªØ³Ù - Ùβ€žØ§   - - - . iv 
ACKNOWLEDGEMENT   -  v 
DEDICATION - .. vi 
TABLE OF CONTENTS   - - - . vii 
LIST OF FIGURES   - - - ..  ix 
LIST OF ABBREVIATIONS   - - - xi 

1 INTRODUCTION   - - 1 
1.1 Introduction   - - - 1 
1.2 Project Background - - - 1 
1.3 Problem Statement   - - .. 1 
1.4 Motivation   - . 1 
1.5 Objectives   - . 2 
1.6 Thesis Layout   - - 2 

2 LITERATURE REVIEW   - - - 3 
2.1 Introduction   - - - 3 
2.2 Authentication - - - . 3 
2.3 Biometrics - . 4 
2.3.1 Generic biometric authentication system   - - - - _  5 
2.3.2 Fingerprint biometrics   - - - - -  6 
2.3.2.1 Fingerprint characteristics - - -  6 
2.3.2.2 Issues in fingerprint recognition technology - - ..  7 
2.3.3 Face biometrics - - - - -  8 
2.3.3.1 Processing workflow - .  8 
2.4 Software Architectural Concepts   - - 9 
2.4.1 Claims-Based Authentication and Identity Providers - - - _  9 
2.4.1.1 Components of the claim-based authentication   - -  10 
2.4.1.2 Claims-based authentication standards   - -  12 
2.4.1.3 Token format standard : Security Assertion Markup Language 2.0 (SAML 2.0)   - -  12 
2.4.2 Service oriented Architecture - - - - -  13 
2.4.3 Model-View-Controller (MVC) - - - -  14 
2.4.3.1 Components interaction   - - - ..  15 
2.5 Programming Languages, Platforms, Technologies and Tools - 16 
2.5.1 Programming languages - - - - _  16 
2.5.2 Platforms   - - - - - -  16 
2.5.3 Technologies   - - - - - _  16 
2.5.4 Tools - - - - - -  18 

3 METHODOLOGY - - - 20 
3.1 Introduction   - - 20 
3.2 Project Initiation - 20 
3.3 Project Planning   - . 22 
3.3.1 Scope planning - - - - - _  22 
3.3.2 Time planning - - - - -  22 
3.3.3 Risk management planning   - - - - -  23 
3.4 Project Execution - - .. 23 
3.4.1 Software requirements   - - - - -  24 
3.4.2 Software design   - - - - - _  24 
3.4.2.1 BioSTS - - - ..  25 
3.4.2.2 Employees Administration Module   - -  35 
3.4.2.3 Employees Access Module   - .

πŸ“„ Pages: 100       🧠 Words: 14937       πŸ“š Chapters: 5 πŸ—‚οΈοΈ For: PROJECT

πŸ‘οΈβ€πŸ—¨οΈοΈοΈ Views: 402      

⬇️ Download (Complete Report) Now!

πŸ“₯ Instant Access: Download the fully developed, tested, and ready-to-use software that matches this project topic. Save weeks of effort and get the complete working solution immediately. Trusted by students & professionals, with fast delivery guaranteed.

Get Developed Software

πŸ‘¨β€πŸ’» Hire a Software Developer: Work with an experienced software engineer who can customize, improve, or build your project from scratch. Get professional coding, tailored features, and expert guidance to make your project stand out. 100% reliable service, with proven results and client satisfaction.

Hire a Software Developer

πŸ”— Related Topics

DESIGN AND IMPLEMENTATION OF A COMPUTERIZED SECURITY INFORMATION SYSTEM FOR ENUGU STATE DESIGN AND IMPLEMENTATION OF A COMPUTERIZED LEDGER ACOUNTING SYSTEM DESIGN AND IMPLEMENTATION OF A COMPUTERIZED HUMAN RESOURCES MANAGEMENT SYSTEM DESIGN AND IMPLEMENTATION OF COMPUTERIZED POPULATION CENSUS SOFTWARE SYSTEM DESIGN AND IMPLEMENTATION OF INFORMATION (ENCRYPTION AND DECRYPTION) FOR FIRMS AND IMDIVIDUALS DESIGN AND IMPLEMENTATION OF A COMPUTERISED RESTURANT MANAGEMENT INFORMATION SYSTEM DESIGN AND IMPLEMENTATION OF WEB-BASED SCHOOL MANAGEMENT SYSTEM DESIGN AND IMPLEMENTATION OF A WEB BASED TOURISM INFORMATION SYSTEM DESIGN AND IMPLEMENTATION OF ASSETS MANAGEMENT SYSTEM DESIGN AND IMPLEMENTATION OF AN AUTOMATED INVENTORY CONTROL SYSTEM FOR A MANUFACTURING ORGANISATION DESIGN AND IMPLEMENTATION OF COMPUTERIZED ACADEMIC PLANNING SYSTEM FOR LERNING INSTITUTION DESIGN AND IMPLEMENTATION OF COMPUTERIZED MARKET UNION ADMINISTRATION DESIGN AND IMPLEMENTATION OF A COMPUTERIZED CAREER GUIDANCE INFORMATION SYSTEM DESIGN AND IMPLEMENTATION OF A WEB CHART SYSTEM USING OPEN FLASH DESIGN AND IMPLEMENTATION OF A MOBILE AND WEB APPLICATION FOR THE AUTOMATION OF LIBRARY TASK DESIGN AND IMPLEMENTATION OF A COMPUTER BASED CARTOGRAPHIC SYSTEM DESIGN AND IMPLEMENTATION OF AN INTERACTIVE ONLINE PLATFORM FOR STUDENTS AND SCHOOL SUPERVISORS TO COMMUNICATE REGULARLY DURING THE STUDENTS IT/SIWES ATTACHMENT. DESIGN AND IMPLEMENTATION OF COMPUTERIZED DATA ENCRYPTION DESCRIPTION SYSTEM DESIGN AND IMPLEMENTATION OF A DATA COMPRESSION SOFTWARE DESIGN AND IMPLEMENTATION OF A COMPUTERIZED MEDICAL DIAGNOSIS SYSTEM FOR GONORRHEA INFECTION ANALYSIS

click on whatsapp