Site Logo E-PROJECTTOPICS

DESIGN AND IMPLEMENTATION OF CLAIM BASED BIOMETRIC AUTHENTICATION SYSTEM OVER THE CLOUD


By


Osman Mirghani Osman Elsayed



Presented To


Computer Science Department

πŸ“„ Pages: 100       🧠 Words: 14937       πŸ“š Chapters: 5 πŸ—‚οΈοΈ For: PROJECT

πŸ‘οΈβ€πŸ—¨οΈοΈοΈ Views: 341      

⬇️ Download (Complete Report) Now!

πŸ“₯ Instant Access: Download the fully developed, tested, and ready-to-use software that matches this project topic. Save weeks of effort and get the complete working solution immediately. Trusted by students & professionals, with fast delivery guaranteed.

Get Developed Software

πŸ‘¨β€πŸ’» Hire a Software Developer: Work with an experienced software engineer who can customize, improve, or build your project from scratch. Get professional coding, tailored features, and expert guidance to make your project stand out. 100% reliable service, with proven results and client satisfaction.

Hire a Software Developer
ABSTRACT 
 
In spite of their widespread use and ubiquity, passwords are unreliable as an 
authentication methodology because they can be hacked or even guessed, yet when it comes to 
biometrics it is very hard to impersonate someone. Therefore, biometric authentication schemes 
are currently widely recognized as the strongest authentication technologies available on the 
market. 
  Identity providers and claims-based identity  are  emerging technologies that aims to 
decouple the authentication logic from the applicationÒ€s business logic. This can be done by 
assigning the authentication task to the identity provider and establishing a trust relationship 
between the application and the identity provider so that the application relies on the identity 
provider to authenticate the application users. 
  The project aims to develop an identity provider that uses fingerprint  and facial 
biometrics to authenticate users. The identity provider task is to determine the identity of the user 
and pass the identity information to the relying applications which trust this identity provider. 
  For security purposes, the biometrics data of users is stored on a local server within the 
sponsoring companyÒ€s intranet. This local server is located behind firewalls and itÒ€s address can 
only be resolved internally within the intranet due to use of NAT. Therefore, the server doesnÒ€t 
have a global  IP address. Windows Azure cloud platform has a powerful component called 
Ò€œWindows Azure Service BusΓ’β‚¬Â which was used to solve this tough connectivity problem. 
  The project also aims to develop a simple employees management application that can be 
used as an example of a relying application that relies on the developed identity provider to 
authenticate the users. 
  Project management principles and software development lifecycle techniques were 
applied during the project implementation. This approach has significantly streamlined the 
project implementation process and the project objectives have been met. 
TABLE OF CONTENTS 
 
DICLARATION OF ORIGINALITY   - -  ii 
ABSTRACT   - - - ..  iii 
صÙβ€žØ®ØªØ³Ù - Ùβ€žØ§   - - - . iv 
ACKNOWLEDGEMENT   -  v 
DEDICATION - .. vi 
TABLE OF CONTENTS   - - - . vii 
LIST OF FIGURES   - - - ..  ix 
LIST OF ABBREVIATIONS   - - - xi 

1 INTRODUCTION   - - 1 
1.1 Introduction   - - - 1 
1.2 Project Background - - - 1 
1.3 Problem Statement   - - .. 1 
1.4 Motivation   - . 1 
1.5 Objectives   - . 2 
1.6 Thesis Layout   - - 2 

2 LITERATURE REVIEW   - - - 3 
2.1 Introduction   - - - 3 
2.2 Authentication - - - . 3 
2.3 Biometrics - . 4 
2.3.1 Generic biometric authentication system   - - - - _  5 
2.3.2 Fingerprint biometrics   - - - - -  6 
2.3.2.1 Fingerprint characteristics - - -  6 
2.3.2.2 Issues in fingerprint recognition technology - - ..  7 
2.3.3 Face biometrics - - - - -  8 
2.3.3.1 Processing workflow - .  8 
2.4 Software Architectural Concepts   - - 9 
2.4.1 Claims-Based Authentication and Identity Providers - - - _  9 
2.4.1.1 Components of the claim-based authentication   - -  10 
2.4.1.2 Claims-based authentication standards   - -  12 
2.4.1.3 Token format standard : Security Assertion Markup Language 2.0 (SAML 2.0)   - -  12 
2.4.2 Service oriented Architecture - - - - -  13 
2.4.3 Model-View-Controller (MVC) - - - -  14 
2.4.3.1 Components interaction   - - - ..  15 
2.5 Programming Languages, Platforms, Technologies and Tools - 16 
2.5.1 Programming languages - - - - _  16 
2.5.2 Platforms   - - - - - -  16 
2.5.3 Technologies   - - - - - _  16 
2.5.4 Tools - - - - - -  18 

3 METHODOLOGY - - - 20 
3.1 Introduction   - - 20 
3.2 Project Initiation - 20 
3.3 Project Planning   - . 22 
3.3.1 Scope planning - - - - - _  22 
3.3.2 Time planning - - - - -  22 
3.3.3 Risk management planning   - - - - -  23 
3.4 Project Execution - - .. 23 
3.4.1 Software requirements   - - - - -  24 
3.4.2 Software design   - - - - - _  24 
3.4.2.1 BioSTS - - - ..  25 
3.4.2.2 Employees Administration Module   - -  35 
3.4.2.3 Employees Access Module   - .

πŸ“„ Pages: 100       🧠 Words: 14937       πŸ“š Chapters: 5 πŸ—‚οΈοΈ For: PROJECT

πŸ‘οΈβ€πŸ—¨οΈοΈοΈ Views: 341      

⬇️ Download (Complete Report) Now!

πŸ“₯ Instant Access: Download the fully developed, tested, and ready-to-use software that matches this project topic. Save weeks of effort and get the complete working solution immediately. Trusted by students & professionals, with fast delivery guaranteed.

Get Developed Software

πŸ‘¨β€πŸ’» Hire a Software Developer: Work with an experienced software engineer who can customize, improve, or build your project from scratch. Get professional coding, tailored features, and expert guidance to make your project stand out. 100% reliable service, with proven results and client satisfaction.

Hire a Software Developer

πŸ”— Related Topics

DESIGN AND IMPLEMENTATION OF A COMPUTERIZED COMMUNITY THRIFT MANAGEMENT INFORMATION SYSTEM DESIGN AND IMPLEMENTATION OF ONLINE POS RECEIPT GENERATING SYSTEM DESIGN AND IMPLEMENTATION OF NETWORK CONNECTIVITY AND TRAFFIC CONTROL OF MTN NETWORK IN NIGERIA. DESIGN AND IMPLEMENTATION OF COMPUTERIZED REVENUE ANALYSIS SYSTEM COMPUTERIZED VISA PROCESSING INFORMATION SYSTEM COMPUTERIZATION OF PHONE BILLING SYSTEM DESIGN AND IMPLEMENTATION OF A COMPUTERIZED CONTACT MANAGEMENT SYSTEM DESIGN AND IMPLEMENTATION OF AN ATM POINT LOCATOR DESIGN AND IMPLEMENTATION OF AN INTELLIGENCE BASED SYSTEM FOR STUDENTS PERFORMANCE EVALUATION Design and implementation of a computerized traffic offence system DESIGN AND IMPLEMENTATION OF A COMPUTER BASED SEAPORT BILLING SYSTEM DESIGN AND IMPLEMENTATION OF A COMPUTERIZED LOAN AND ADVANCE SYSTEM DESIGN AND IMPLEMENTATION OF A WINDOW BASED FRONT-DESK INFORMATION SYSTEM DESIGN AND IMPLEMENTATION OF ONLINE POST-UTME SYSTEM DESIGN AND IMPLEMENTATION OF GEOGRAPHICAL INFORMATION SYSTEM DEIGN AND IMPLEMENTATION OF A COMPUTER BASED LOAN SCHEME MANAGEMENT SYSTEM DESIGN AND IMPLEMENTATION OF A COMPUTERIZED SYSTEM FOR THE METHODOLOGICAL TEST ANALYSIS DESIGN AND IMPLEMENTATION OF FINGERPRINT VERIFICATION SYSTEM FOR CRIME AN IMPROVED IMAGE STEGANOGRAPHY BASED ON LEAST SIGNIFICANT BIT MATCHING REVISITED (LSBMR) USING SOBEL EDGE DETECTION DESIGN AND IMPLEMENTATION OF AN ONLINE ENTRANCE EXAMINATION ADMINISTRATION SYSTEM.

click on whatsapp