Mobile Platform Biometric Cloud Authentication

Agostinho Marques Ximenes, Sritrusta Sukaridhoto, Amang Sudarsono, Hasan Basri

Sari


Berdasarkan data Pusat Statistik Indonesia, tingkat kemiskinan pada bulan September 2018 adalah 25,95 juta, berdasrkan data tingkat kemiskinan masyarakat  tersebut  pemeritnah menyalurkan dana bantuan mengatasi tingkat kemiskinan masyarakat melalui Bank. Namun, Bank tidak dapat mengalokasikan dana karena biaya untuk membangun infrastruktur mahal, seperti membuat ATM.Berbagai kendala tersebut, Bank perlu menemukan solusi baru agar dapat mengalokasikan dana kepada masyrakat dengan biaya yang murah, Mobile Platform Biometric Cloud Authentication adalah salah satu solusi. Dalam penelitian ini, eksperimen yang dilakukan melakukan autentikasi dengan QR Code Scan dan face recognize (data face dienkripsi dan didekripsi dengan kritografi algoritma AES 256 bit). Konsentrasi penelitian ini terletak pada  eksperimen terhadap komunikasi keamanan data transaksi payment  merchant onlie degan QR Code scan dan Face recognize yang berbasis mobile android dan serta spesfikasi android versi 23. Hasil pengujian pada aplikasi Mobile ini menunjukkan bahwa QR Code scan dan face recognize dapat diimplementasikan pada transaksi payment merchant online dengan akurasi 95% dan membutuhkan 53, 21 detik per transaksi.


Kata Kunci


Biometrics, Cloud, Cryptography, QR Code.

Teks Lengkap:

PDF

Referensi


Badan Pusat Statistik Indonesia, “Profil Kemiskinan di Indonesia September 2017,” BPS (Badan Pusat Statistics), vol. 01, Jakarta, pp. 1–12, 2018.

W. Zhang, “Online Invoicing System Based on QR Code Recognition and Cloud Storage,” Proc. 2018 2nd IEEE Adv. Inf. Manag. Commun. Electron. Autom. Control Conf. IMCEC 2018, no. Imcec, pp. 2576–2579, 2018.

A. Amran, S. M. Nasution, and F. Azmi, “Implementasi Algoritma Kriptografi pada Sistem Biometric Payment,” Implementasi Algorithm. Kriptografi pada Sist. Biometric Paym., vol. 3, no. 1, pp. 1–10, 2013.

S. Chinchu, A. Mohammed, and B. S. Mahesh, “A novel method for real-time face spoof recognition for single and multiple user authentication,” 2017 Int. Conf. Intell. Comput. Instrum. Control Technol. ICICICT 2017, vol. 2018-January, pp. 376–380, 2018.

F. Omri, S. Foufou, R. Hamila, and M. Jarraya, “Cloud-based mobile system for biometrics authentication,” 2013 13th Int. Conf. ITS Telecommun. ITST 2013, pp. 325–330.

G. Skourletopoulos et al., “Elasticity Debt Analytics Exploitation for Green Mobile Cloud Computing: An Equilibrium Model,” IEEE Trans. Green Commun. Netw., vol. 3, no. 1, pp. 122–131, 2019.

P. Tresadern et al., “Mobile biometrics: Combined face and voice verification for a mobile platform,” IEEE Pervasive Comput., vol. 12, no. 1, pp. 79–87, 2013

X. Sun and N. Ansari, “Green Cloudlet Network: A Sustainable Platform for Mobile Cloud Computing,” IEEE Trans. Cloud Comput., vol. XX, no. XX, pp. 1–14, 2017.

M. Stojmenovic, “Mobile cloud computing for biometric applications,” Proc. 2012 15th Int. Conf. Network-Based Inf. Syst. NBIS 2012, pp. 654–659, 2012.

S. Guan, R. E. De Grande, and A. Boukerche, “A novel energy-efficient platform-based model to enable mobile Cloud applications,” Proc. - IEEE Symp. Comput. Commun., vol. 2016-August, pp. 914–919, 2016.

S. Rahmawati, I. Taufik, and G. Sandi, “Implementasi Algoritma AES (Advanced Encryption Standard) 256 Bit Dan Kompresi Menggunakan Algoritma Huffman Pada Aplikasi Voice Recorder,” Prosiding-Seminar Nas. Tek. Elektro UIN Sunan Gunung Djati Bandung, pp. 91–99, 2018.

R. Andriani, S. E. Wijayanti, and F. W. Wibowo, “Comparision of AES 128, 192 and 256-bit algorithm for encryption and description file,” Proc. - 2018 3rd Int. Conf. Inf. Technol. Inf. Syst. Electr. Eng. ICITISEE 2018, pp. 120–124, 2019.

M. Azure, Face API Azure Documentation.

J. Zhou, X. G. Lu, D. Zhang, and C. Y. Wu, “Orientation analysis for rotated human face detection,” Image Vis. Comput., vol. 20, no. 4, pp. 257–264, 2002.

X. Cao, Y. Wei, F. Wen, and J. Sun, “Face alignment by explicit shape regression,” Int. J. Comput. Vis., vol. 107, no. 2, pp. 177–190, 2014.

R. Stefan and S. Daniel, “Cryptography for Security and Privacy in Cloud Computing,” Artech House Computer Security Library, 2014.

T. Khan, “A Cloud-Based Smart Expiry System Using QR Code,” IEEE Int. Conf. Electro Inf. Technol., vol. 2018-May, pp. 245–248, 2018.




DOI: http://dx.doi.org/10.31963/intek.v6i2.1525

Refbacks

  • Saat ini tidak ada refbacks.


Publisher by:

Politeknik Negeri Ujung Pandang
Kampus 1 Gedung Administrasi Lantai II
Jalan Perintis Kemerdekaan KM.10 Tamalanrea
Makassar 90245
E-mail: intek@poliupg.ac.id

INTEK Indexed by:

g61g61g61g61g61g61g61g61g61

 Member of :

Creative Commons License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

 View My Stats