Browse > Article
http://dx.doi.org/10.5762/KAIS.2020.21.3.24

User Integrated Authentication System using EID in Blockchain Environment  

Kim, Jai-Yong (Dept. of Computer Science, Soong-Sil University)
Jung, Yong-Hoon (UniHubLAB)
Jun, Moon-Seog (Dept. of Computer Science, Soong-Sil University)
Lee, Sang-Beon (UniHubLAB)
Publication Information
Journal of the Korea Academia-Industrial cooperation Society / v.21, no.3, 2020 , pp. 24-31 More about this Journal
Abstract
Centralized systems in computing environments have various problems, such as privacy infringement due to hacking, and the possibility of privacy violations in case of system failure. Blockchain, one of the core technologies for the next generation of converged information, is expected to be an alternative to the existing centralized system, which has had various problems. This paper proposes a blockchain-based user authentication system that can identify users using EID in an online environment. Existing identification (ID)/password (PW) authentication methods require users to store personal information in multiple sites, and receive and use their respective IDs. However, the proposed system can be used without users signing up at various sites after the issuing of an EID. The proposed system issues an EID with a minimum of information, such as an e-mail address and a telephone number. By comparing the stability and efficiency of a centralized system, the proposed integrated authentication system proved to be excellent. In order to compare stability against existing systems, we chose attack methods and encroachments on the computing environment. To verify efficiency, the total throughput between the user's app, the issuance and certification-authority's servers, and the service provider's servers was compared and analyzed based on processing time per transaction.
Keywords
User Authentication; Identification; SSO; Block Chain; OTP;
Citations & Related Records
Times Cited By KSCI : 15  (Citation Analysis)
연도 인용수 순위
1 H. Kim, I. Lee, "A Study on Secure and Improved Single Sign-On Authentication System against Replay Attack", Jr. of the Korea Institute of Information Security & Cryptology, Vol.24, No.5, pp.769-780, 2014. DOI: https://doi.org/10.13089/JKIISC.2014.24.5.769
2 Security Technology Research Team, Comparison of Changes and Characteristics of Identity Information Management Types, Security Research Department, Financial Security Agency, Korea, pp.1-6, 2017.
3 BSI, Common Criteria Protection Profile-Machine Readable Travel Document with ICAO Application, Extended Access Control with PACE(EAC pp), BSI-PP-0017, Version1.3.0, 20th January 2012.
4 Gaurav S.,Kcand Paul A.,Karger, Security and privacy issues in machine readable travel documents(MRTDs), IBM Technical Report(RC 23575), IBM T.J, Watson Research Labs, Apr 2005.
5 BSI, Advanced Security Mechanisms Machine Readable Travel Documents - Extended Access Control(EAC), Version 2.05, TR-03110, 2010.
6 NIST. "FIPS Publication186-1:Digital Signature Standard(DS-S)", November 2008.
7 G. W. Kuk, Application Cases by Blockchain Technology and Industry Sectors, Weekly ICT Trends, Institute of Information & Communications Technology Planning & Evaluation, Vol.1900, pp.13-27, 2019.
8 Y. J. Lee, Taeyeol Jeon.. "An Fingerprint Authentication Model of ERM System using Private Key Escrow Management Server", Journal of the Korea Academia-Industrial, Vol.20, No.6, pp.1-8. 2019. DOI: https://doi.org/10.5762/KAIS.2019.20.6.1
9 J. H. Jang, S. H. Song, S. T. Kim, "A Survey on Blockchain Platforms for Supply Chain Management", The Journal of The Institute of Internet, Broadcasting and Communication, Vol.18, No.5, pp.259-265, 2019. DOI: https://doi.org/10.7236/JIIBC.2018.18.5.259   DOI
10 J. C. Park, "A Secure Single Sign-On Scheme across Multiple Allied Websites using Smartphones". Journal of Security Engineering, Vol.14, No.3, pp. 189-204, 2017. DOI: http://dx.doi.org/10.14257/jse.2017.06.01   DOI
11 Y. Choi, H. Kwon, "A Study on Legal Issues between the Application of Blockchain Technology and Deletion and the Third Party Supply of Personal Information", Journal of the Korea Institute of Information Security & Cryptology, Vol.28, No.6, pp.1607-1621, 2018. DOI: https://doi.org/10.13089/JKIISC.2018.28.6.1607   DOI
12 S. J. Han, S. T. Kim, S. Y. park, "A GDPR based Approach to Enhancing Blockchain Privacy", The Journal of The Institute of Internet, Broadcasting and Communication, Vol.19, No.5, pp.33-38, 2019. DOI: https://doi.org/10.7236/JIIBC.2019.19.5.33
13 S. G. Moon, M. S. Kim, H. J. Kim, "Design of an Integrated University Information Service Model Based on Block Chain", Journal of the Korea Academia-Industrial cooperation Society Vol. 20, No. 2 pp. 43-50, 2019. DOI: https://doi.org/10.5762/KAIS.2019.20.2.43   DOI
14 M. J. Cho, C. H. Lee, "Access Control Mechanism for Industrial Control System Based Smart Contract", Journal of The Korea Institute of Information Securty & Cryptology, Vol.29, No.3, pp.579-588, 2019. DOI: https://doi.org/10.13089/JKIISC.2019.29.3.579
15 S. D. Yoo, "A Study on Consensus Algorithm based on Blockchain", The Journal of The Institute of Internet, Broadcasting and Communication, Vol.19, No.3, pp.25-32, 2019. DOI: https://doi.org/10.7236/JIIBC.2019.19.3.25   DOI
16 J. K. Lee, J. G. Son, H. M. Kim, H. K. Oh, "An Authentication Scheme for Providing to User Service Transparency in Multicloud Environment", Journal of The Korea Institute of Information Security & Cryptology, Vol.23, No.6, pp.1131-1141, Dec 2013. DOI: https://doi.org/10.13089/JKIISC.2013.23.6.1131   DOI