Browse > Article
http://dx.doi.org/10.9708/jksci.2018.23.01.111

A Secure Decentralized Storage Scheme of Private Information in Blockchain Environments  

Han, Seungjin (Dept. of Business Administration, Kyung-In Women's University)
Abstract
Recently, IoT and Big Data dealing with voluminous and complex sensitive information is one of the key issues in the era of the 4th industrial revolution. There have been a lot of studies to store the collected and processed sensitive information safely in storage data. Especially biometric information, if it is leaked and becomes identity theft, is hard to be corrected and results in serious event. To fix the problem, methods such as FIDO or KFTC have been proposed. In this paper, we propose a modified method of TTAK.KO-12.0098 according to the environment of this paper and propose a method of safely storing the generated disposable template in a block chain. We show that our method is better by comparing the existing method and the security analysis.
Keywords
Blockchain; One-Time Template; Biometric; Distributed Ledger;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Akabane Yoshiharu et., al, Block Chain Structure and Theory, Wikibooks, 2017.
2 TTA, "Biometric Authentication Framework based on One-Time Template," TTA Standard, TTAK.KO-12. 0098, 19 Dec,. 2008.
3 Fido Alliance, https://fidoalliance.org/specs/fido-uafv1.0-ps-20141208/fido-uaf-protocol-v1.0-ps-20141208.pdf
4 Korea Financial Telecommunications & Clearings Institute, "Standard for distributed management of biometrics," Korea Financial Telecommunications & Clearings Institute, June. 2015.
5 Digital Times, http://www.dt.co.kr/contents.html?article_no=2017072702101360053001
6 Youngdeok Seo et., al, "The implementation of secure decentralized storage system using Bitcoin Blockchain," Korea Computer Congress 2016, pp.1148-1150, June. 2016.
7 Masayuki Fukumitsu et., al, "A Proposal of a Secure P2P-type Storage Scheme by using the Secret Sharing and the Blockchain," 2017 IEEE 31st International Conference on Advanced Information Networking and Applications, Taipei, Taiwan, pp.803-810, 27th-29th March. 2017.
8 Jaejung Kim, "Study on the password-free certification system using the FIDO (Fast IDentity Online)," Communications of the Korea Information Science Society, KIISE, vol. 33, no. 5, May. 2015.
9 ITU-T SG17 WG5 Q9, http://www.itu.int/itu-t/workprog/wp_item.aspx?isn=9429 Authors
10 Satoshi Nakamoto, Bitcoin: A peer-to-peer electronic cash system, Consulted, 1(2012):28, 2008.
11 S. J. Han, "A Robust Mutual Authentication between User Devices and Replaying Server(FIDO Server) using Certificate Authority in FIDO Environments." Journal of The Korea Society of Computer and Information, The Korea Society of Computer and Information, vol. 21, no. 10, Oct,. 2016.
12 Tiago Duarte et., al, "Biometric access control systems: A review on technologies to improve their efficiency," Power Electronics and Motion Control Conference (PEMC), 2016 IEEE International, Varna, Bulgaria, pp.25-28, Sept,. 2016.
13 A. Kaveh and W. H. Chung, "Temporal and spectral features of single lead ECG for human identification," Biometric Measurements and Systems for Securityand Medical Applications (BIOMS), 2013 IEEE Workshop on IEEE, pp.17-21, Sept,. 2013.
14 J. Wang, M. She, S. Nahavandi, and A. Kouzani, "Human identification from ECG signals via sparse representation of local segments," Signal processing letters IEEE, Vol. 20, Issue 10, pp.937-940, June. 2013.   DOI
15 S. K. Yeom, H. I. Suk, and S. W. Lee, "Person authentication from neural activity of face-specific visual self-representation." Pattern recognition, Vol. 46, Issue 4, pp.1159-1169, April. 2013.   DOI
16 K. Brigham and B. V. K. V. Kumar, "Subject identification from electroencephalogram (EEG) signals during imagined speech." Biometrics: theory applications and systems (BTAS), 2010 Fourth IEEE international conference on. IEEE, pp.1-8, Sept,. 2010.
17 Seoul National University Hospital, Domestic and overseas biological signal identification technology analysis and research DB construction, Technical Report, KISA, 25, Jan,. 2016.
18 Jason Kim and Sam Lee, "Trend and prospect of telebiometric technology using biosignals," Review of KIISC, Korea Institute of Information Security and Cryptology, vol. 26, no. 4, pp.41-46, Aug,. 2016.   DOI