Browse > Article
http://dx.doi.org/10.13089/JKIISC.2018.28.4.1021

Improving Customer Information Management System by Using Blockchain and Biometric Authentication  

Na, YunSeok (UST-ETRI)
Cho, Sangrae (ETRI)
Kim, Soo-hyung (UST-ETRI)
Abstract
Nowadays, the ubiquitous environment that can utilize the computer everywhere is being formed. As the environment changes, services develop and manage systems and databases that can manage customer information to provide better services to customers through Information Technology. The system that most services maintain is a way of putting and managing customer information on the server. In this paper, we first find the problem in terms of security and convenience. After that, we propose a solution that improves the problem through blockchain technology and biometric authentication.
Keywords
Blockchain; Biometrics; Privacy; Personal Information Management;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 CSID, "Consumer Survey: Password Habits" https://www.csid.com/wp-content/uploads/2012/09/CS_PasswordSurvey_FullReport_FINAL.pdf, Sep. 2012
2 D. Maltoni, D. Maio, A.K. Jain, and, S. Prabhakar, Handbook of fingerprint recognition, 2nd Ed., Springer Science & Business Media, Apr. 2009.
3 A.K. Jain, K. Nandakumar, and A. Nagar, "Biometric template security," EURASIP Journal on Advances in Signal Processing, Jan. 2008
4 C. Roberts, "Biometric attack vectors and defences." Computers & Security, vol. 26.1, pp. 14-25, Feb. 2007   DOI
5 TTA, "Biometric Authentication Framework based on One-Time Template", TTAK.KO-12.0098, Dec 2008
6 Woo Yong Choi, Yongwha Chung, Jin-Won Park and Dowon Hong, "Fingerprint Template Protection Using One-Time Fuzzy Vault," KSII Transactions on Internet and Information Systems, vol. 5, no. 11, pp. 2221-2234, Nov 2011.   DOI
7 Daesung Moon, Sungju Lee, Seunghwan Jung, Yongwha Chung, Miae Park, and Okyeon Yi "Fingerprint template protection using fuzzy vault." International Conference on Computational Science and Its Applications, LNCS 4707, pp. 1141-1151, 2007.
8 Bank Of Korea, "Seminar on promotio n of biometric authentication in finan cial sector" https://www.bok.or.kr/viewer/skin/doc.html?fn=FILE_201803300815507562.pdf&rs=/webview/result/P0000559/201507, Jul 2015
9 FIDO Alliance, "FIDO UAF Architectu ral Overview 1.0" , https://fidoalliance.org/specs/fido-uaf-v1.0-ps-20141208/fido-uaf-overview-v1.0-ps-20141208.html, Dec 2014.
10 ETRI, "Passwordless Authentication Technology-FIDO", Electronics and Telecommnucations Trends, vol. 29. no. 4, pp. 101-109, Aug 2014.
11 G. Zyskind, O. Nathan, and A. Pentland, "Decentralizing privacy: Using blockchain to protect personal data," IEEE Security and Privacy Workshops (SPW), pp. 180-184, May. 2015.
12 A.C. Yao, "Protocols for secure computations." Foundations of Computer Science, 1982. SFCS'08. 23rd Annual Symposium on. IEEE, Nov 1982.
13 M. Fukumitsu, S. Hasegawa, J. Iwazaki, M. Sakai, D. Takahashi "A Proposal of a Secure P2P-type Storage Scheme by using the Secret Sharing and the Blockchain," IEEE 31st International Conference on Advanced Information Networking and Applications (AINA), pp. 803-810, Mar. 2017.
14 A. Shamir, "How to share a secret." Communications of the ACM vol. 22. no. 11 pp. 612-613, Nov 1979.   DOI
15 V. Buterin, "A next-generation smart contract and decentralized application platform." white paper 2014.
16 A. Azaria, A. Ekblaw, T. Vieira, A. Lippman "Medrec: Using blockchain for medical data access and permission management." Open and Big Data (OBD), International Conference on. IEEE, Aug. 2016.
17 W. Stallings, Cryptography and network security: principles and practices, 4th Ed., Prentice Hall, Nov. 2005.
18 K. Wust and A. Gervais. "Do you need a Blockchain?." IACR Cryptology ePrint Archive 2017-375, Apr. 2017.
19 N. Satoshi, "Bitcoin: A peer-to-peer electronic cash system.", 2008.
20 A.M. Antonopoulos, Mastering Bitcoin: unlocking digital cryptocurrencies, 1st Ed., O'Reilly Media, Inc, Dec. 2014.
21 A. Juels and M. Wattenberg. "A fuzzy commitment scheme," CCS '99 Proceedings of the 6th ACM conference on Computer and communications security, pp. 28-36, Nov. 1999