Abstract
Door locks and user authentication are the major issues in the current banking industry. There are a number of user future computing techniques, and security is especially essential to these methods. Existing digital door locks have the problem of opening easily with a stolen PIN number or by electrical shock. Thus, this study proposed and implemented an integrated automatic log-in platform based on mobile fingerprint recognition by applying the blockchain theory. As a result of this research, a convenient, integrated automatic log-in platform with powerful security has been constructed using a smartphone-based fingerprint recognition function. There are three major functions of the platform. First, it is possible to authenticate the user in PC, mobile device, and IoT environments through fingerprint recognition. Second, the platform includes SDK to develop application software for user authentication and IoT services. Last is its strengthened security using the blockchain theory to prepare against tampering/forging/leaking of a user’s fingerprint information by hackers.
Similar content being viewed by others
References
Schutzer D (2016) CTO corner: what is a Blockchain and why is it important? FSRoundtable. Retrieved from http://fsroundtable.org/cto-corner-what-is-a-blockchainand-why-is-it-important/. Accessed 1 June 2018
Kestenbaum R (2017) Why bitcoin is important for your business. Forbes. Retrieved from https://www.forbes.com/sites/richardkestenbaum/2017/03/14/why-bitcoinis-important-for-your-business/3/#2da6d4c72b3b. Accessed 1 June 2018
Due.com. (2017) How blockchain improves security and transaction times. Nasdaq. Retrieved from http://www.nasdaq.com/article/how-blockchain-improves-securityand-transaction-times-cm771339. Accessed 1 June 2018
Higgins S (2016) Hours after launch, OpenBazaar sees first drug listings. CoinDesk. Retrieved from http://www.coindesk.com/drugs-contraband-openbazaar/. Accessed 1 June 2018
Young J (2016) Hackers eye e-commerce platforms, bitcoin-based OpenBazaar to capitalize. The Cointelegraph. Retrieved from https://cointelegraph.com/news/hackerseye-e-commerce-platforms-bitcoin-based-openbazaar-to-capitalize. Accessed 1 June 2018
Tech (2017) Kaspersky releases more evidence that North Korea was linked to Bangladesh SWIFT hack. Retrieved from http://tech.firstpost.com/news-analysis/kasperskyreleases-more-evidence-that-north-korea-was-linked-to-bangladesh-swift-hack-370229.html. Accessed 1 June 2018
Baker M (2017) Why SWIFT’s days are numbered, and what’s next. MSPmentor. Retrieved from http://mspmentor.net/technologies/why-swift-s-days-are-numberedand-what-s-next. Accessed 1 June 2018
Coward J (2016) Meet the visionary who brought blockchain to the industrial IoT. IOT World News. Retrieved from http://www.iotworldnews.com/author.asp?section_id=495&doc_id=728962. Accessed 1 June 2018
Etzioni A (2015) A cyber age privacy doctrine: more coherent, less subjective, and operational. Brooklyn Law Rev 80(4):1263–1265
Mayer-Sch€onberger V, Cukier K (2013) Big data: a revolution that will transform how we live, work and think. Houghton Mifflin Harcourt, Boston
Kshetri N (2014) Big data’s impact on privacy, security and consumer welfare. Telecommun Policy 38:1134–1145
Seth S (2017) Banks need to be centralized—could blockchain be the answer? Finance Magnates. http://www.financemagnates.com/cryptocurrency/bloggers/banksneed-centralized-blockchain-answer/. Accessed 1 June 2018
Mainelli M (2017) Blockchain will help us prove our identities in a digital world. Harvard Business Review. Retrieved from https://hbr.org/2017/03/blockchain-willhelp-us-prove-our-identities-in-a-digital-world. Accessed 1 June 2018
Kshetri N (2017) Blockchain’s roles in strengthening cybersecurity and protecting privacy. Telecommun Policy 41:1027–1038
Sharma PK, Moon SY, Park JH (2017) Block-VN: a distributed blockchain based vehicular network architecture in smart city. J Inf Process Syst 13(1):184–195
Sharma PK et al (2017) DistBlockNet: a distributed blockchains-based secure SDN architecture for IoT networks. IEEE Commun Mag IEEE 55(9):78–85
Sharma PK, Chen MY, Park JH (2018) A software defined fog node based distributed blockchain cloud architecture for IoT. IEEE Access 6:115–124
Bahga A, Madisetti VK (2016) Blockchain platform for industrial internet of things. J Softw Eng Appl 9(10):533–546
Christidis K, Devetsikiotis M (2016) Blockchains and smart contracts for the internet of things. IEEE Access 4:2292–2303
Xia Q et al (2017) MeDShare: trust-less medical data sharing among cloud service providers via Blockchain. IEEE Access 5:14757–14767
Li Z et al (2017) Consortium blockchain for secure energy trading in industrial internet of things. IEEE Trans Industr Inform 278–307
Sharma PK, Park JH (2018) Blockchain based hybrid network architecture for the smart city. Future Gener Comput Syst 1–6
Bank of Korea (2016) Development strategy of digital innovation and payment service. In: Bank of Korea Payment and Settlement System Conference, pp 1–4 (in Korean)
Gartner (2016) Retrieved from http://www.gartner.com/events/na/orlando-symposium/
Nakamoto S (2008) Bitcoin: a peer-to-peer electronic cash system, pp 1–9
Antonopoulos AM (2014) Mastering bitcoin: unlocking digital cryptocurrencies. O’Reilly Media Inc., Sebastopol, pp 1–73
Beverly Y, Garcia-Molina H (2003) PPay: micropayments for peer-to-peer systems. In: Proceedings of the 10th ACM Conference on Computer and Communications Security. ACM, pp 300–310
Yoo HW (2016) Implementation and performance improvement plan of blockchain-based electronic ballot system. Graduate School of Information and Communication, Ajou University, Suwon, pp 1–34 (in Korean)
Kim SH, Yang JY, Kim YJ (2015) A study on the selfish mining of blockchain. In: 2015 Autumn Conference. The Korean Institute of Communications and Information Sciences, pp 1–4 (in Korean)
Cheon IG (2015) Android programming, easy explanations with pictures. Rev (3). Life and Power Press (in Korean)
Peters GW, Panayi E, Chapelle A (2015) Trends in crypto-currencies and Blockchain technologies: a monetary theory and regulation perspective. J Financ Perspect 3(3):1–43
Gervais A, Karame GO, Wüst K, Glykantzis V, Ritzdorf H, Capkun S (2016) On the security and performance of proof of work blockchains. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, pp 3–16
Underwood S (2016) Blockchain beyond bitcoin. Commun ACM 59(11):15–17
Zyskind G, Nathan O (2015) Decentralizing privacy: using blockchain to protect personal data. In: Security and Privacy Workshops (SPW). IEEE, pp 180–184
Kiayias A, Koutsoupias E, Kyropoulou M, Tselekounis Y (2016) Blockchain mining games. In: Proceedings of the 2016 ACM Conference on Economics and Computation. ACM, pp 365–382
Huh J-H, Seo K (2016) Design and test bed experiments of server operation system using virtualization technology. Hum Centric Comput Inf Sci 6(1):1–21
Huh J-H, Otgonchimeg S, Seo K (2016) Advanced metering infrastructure design and test bed experiment using intelligent agents: focusing on the PLC network base technology for smart grid system. J Supercomput 72(5):1862–1877
Huh J-H (2017) PLC-based design of monitoring system for ICT-integrated vertical fish farm. Hum Centric Comput Inf Sci 7(20):1–19
Moon S-Y, Park J-H (2016) Efficient hardware-based code convertor of a quantum computer. J Converg 7:1–9
Nagaraju S, Parthiban L (2015) Trusted framework for online banking in public cloud using multi-factor authentication and privacy protection gateway. J Cloud Comput Adv Syst Appl 4(1):1–23
Massias H, Avila XS, Quisquater J-J (1999) Design of a secure timestamping service with minimal trust requirements. In: 20th Symposium on Information Theory in the Benelux, pp 1–8
Haber S, Stornetta WS (1991) How to time-stamp a digital document. In: Conference on the Theory and Application of Cryptography. Springer, pp 437–455
Bayer D, Haber S, Stornetta WS (1993) Improving the efficiency and reliability of digital time-stamping. Seq II: Methods Commun Secur Comput Sci 329–334
Haber S, Stornetta WS (1997) Secure names for bit-strings. In: Proceedings of the 4th ACM Conference on Computer and Communications Security. ACM, pp 28–35
Huh J-H, Seo K (2017) Design and implementation of mobile fingerprint recognition and automatic log-in platform framework. BIC 2017:1
Acknowledgements
The first draft of this paper was presented at The International Conference on Big data, IoT, and Cloud Computing (BIC 2017) [45], August 22–24, 2017, Republic of Korea. This work was supported by the National Research Foundation of Korea (NRF) Grant funded by the Korea government (MSIT) (No. 2017R1C1B5077157).
Author information
Authors and Affiliations
Corresponding author
About this article
Cite this article
Huh, JH., Seo, K. Blockchain-based mobile fingerprint verification and automatic log-in platform for future computing. J Supercomput 75, 3123–3139 (2019). https://doi.org/10.1007/s11227-018-2496-1
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-018-2496-1