Improved Biometric Authentication Using Blockchain Based Biometric Authentication Model
Keywords:
Biometric Authentication, Blockchain, Authentication System, intrudersAbstract
In recent decades, Biometric Blockchain Authentication Models are becoming an optimal model on convenience and safety.With user enrolment on the system based on biometric details, the information is management by the administration model as a template and using this the authentication is conducted via an authentication module.Biometric is one of the safest waysover different applications that secures the data in the form of passwords. However, it suffers mostly from the attacks due to leakage of biometric information that prunes the access of intruders. In this paper, we develop a blockchain based security model for the Biometric Blockchain Authentication Model to secure the data and avoids data leakage. The model is designed in such a way that it verifies and secures the entire data in block ledgers. The experimental validation is conducted to test the efficacy of authentication. The results of simulation show that the proposed authentication model achieves higher degree of security than other methods.
Downloads
References
Joseph, T., Kalaiselvan, S. A., Aswathy, S. U., Radhakrishnan, R., &Shamna, A. R. (2021). A multimodal biometric authentication scheme based on feature fusion for improving security in cloud environment. Journal of Ambient Intelligence and Humanized Computing, 12(6), 6141-6149.
El-Rahiem, B. A., El-Samie, F. E. A., & Amin, M. (2021). Multimodal biometric authentication based on deep fusion of electrocardiogram (ECG) and finger vein. Multimedia Systems, 1-13.
Velliangiri, S., Manoharn, R., Ramachandran, S., & Rajasekar, V. R. (2021). Blockchain Based Privacy Preserving Framework for Emerging 6G Wireless Communications. IEEE Transactions on Industrial Informatics.
Adekunle, S. E. (2021). An Innovative Approach in Electronic Voting System Based on Fingerprint and Visual Semagram. International Journal of Information Engineering & Electronic Business, 13(5).
Nahar, M. N., Alsadoon, A., Prasad, P. W. C., Giweli, N., &Alsadoon, O. H. (2021). An enhanced one-time password with biometric authentication for mixed reality surgical Tele-presence. Multimedia Tools and Applications, 80(7), 10075-10100.
Vaya, D., &Hadpawat, T. (2021). Enhanced fingerprint authentication using blockchain. Blockchain 3.0 for Sustainable Development, 10, 123.
Sarier, N. D. (2021). Multimodal biometric authentication for mobile edge computing. Information Sciences, 573, 82-99.
Huang, Y. B., Hou, H., Chen, T., Li, H., & Zhang, Q. Y. (2021). Long sequence biometric hashing authentication based on 2D-SIMM and CQCC cosine values. Multimedia Tools and Applications, 1-27.
Sujarani, R., Manivannan, D., Manikandan, R., &Vidhyacharan, B. (2021). Lightweight Bio-Chaos Crypt to Enhance the Security of Biometric Images in Internet of Things Applications. Wireless Personal Communications, 1-21.
Wang, W., Qiu, C., Yin, Z., Srivastava, G., Gadekallu, T. R., Alsolami, F., & Su, C. (2021). Blockchain and PUF-based Lightweight Authentication Protocol for Wireless Medical Sensor Networks. IEEE Internet of Things Journal.
Preneel, B. (1994). Cryptographic hash functions. European Transactions on Telecommunications, 5(4), 431-448.
Delac, K., &Grgic, M. (2004, June). A survey of biometric recognition methods. In Proceedings. Elmar-2004. 46th International Symposium on Electronics in Marine (pp. 184-193). IEEE.
Gayathri, R., &Ramamoorthy, P. (2012). A fingerprint and palmprint recognition approach based on multiple feature extraction. European Journal of Scientific Research. ISSN, 514-526.
Oravec, M. (2014, September). Feature extraction and classification by machine learning methods for biometric recognition of face and iris. In Proceedings ELMAR-2014 (pp. 1-4). IEEE.
Mansour, A., Sadik, M., Sabir, E., & Azmi, M. (2016, October). A context-aware multimodal biometric authentication for cloud-empowered systems. In 2016 International Conference on Wireless Networks and Mobile Communications (WINCOM) (pp. 278-285). IEEE.
Masala, G. L., Ruiu, P., & Grosso, E. (2018). Biometric authentication and data security in cloud computing. In Computer and network security essentials (pp. 337-353). Springer, Cham.
Khatri, S. K., &Vadi, V. R. (2017, August). Biometrie based authentication and access control techniques to secure mobile cloud computing. In 2017 2nd International Conference on Telecommunication and Networks (TEL-NET) (pp. 1-7). IEEE.
Ahmad, A., Paul, A., Khan, M., Jabbar, S., Rathore, M. M. U., Chilamkurti, N., & Min-Allah, N. (2017). Energy efficient hierarchical resource management for mobile cloud computing. IEEE Transactions on Sustainable Computing, 2(2), 100-112.
Sarier, N. D. (2017, May). Privacy preserving multimodal biometric authentication in the cloud. In International conference on green, pervasive, and cloud computing (pp. 90-104). Springer, Cham.
Nair, V. S., Reshmypriya, G. N., Rubeena, M. M., &Fasila, K. A. (2017, March). Multibiometric cryptosystem based on decision level fusion for file uploading in cloud. In 2017 International Conference on Recent Advances in Electronics and Communication Technology (ICRAECT) (pp. 29-32). IEEE.
Mansour, A., Sadik, M., & Sabir, E. (2015, November). Multi-factor authentication based on multimodal biometrics (MFA-MB) for Cloud Computing. In 2015 IEEE/ACS 12th International Conference of Computer Systems and Applications (AICCSA) (pp. 1-4). IEEE.
Vidya, B. S., & Chandra, E. (2019). Entropy based Local Binary Pattern (ELBP) feature extraction technique of multimodal biometrics as defence mechanism for cloud storage. Alexandria Engineering Journal, 58(1), 103-114.
Abed, L., Clarke, N., Ghita, B., &Alruban, A. (2018, November). Securing cloud storage by transparent biometric cryptography. In International Conference on Security for Information Technology and Communications (pp. 97-108). Springer, Cham.
Kundu, S., & Sarker, G. (2016, January). A new RBFN with modified optimal clustering algorithm for clear and occluded fingerprint identification. In 2016 2nd International Conference on Control, Instrumentation, Energy & Communication (CIEC) (pp. 125-129). IEEE.
Arrawatia, S., Mitra, P., & Kishore, B. (2017). Critical literature survey on iris biometric recognition. Int J Sci Res Sci Technol, 3(6), 600-605.
Jia, W., Zhang, B., Lu, J., Zhu, Y., Zhao, Y., Zuo, W., & Ling, H. (2017). Palmprint recognition based on complete direction representation. IEEE Transactions on Image Processing, 26(9), 4483-4498.
Veeraiah, D., Mohanty, R., Kundu, S., Dhabliya, D., Tiwari, M., Jamal, S.S., Halifa, A. Detection of Malicious Cloud Bandwidth Consumption in Cloud Computing Using Machine Learning Techniques (2022) Computational Intelligence and Neuroscience, 2022, art. no. 4003403
Dhanikonda, S.R., Sowjanya, P., Ramanaiah, M.L., Joshi, R., Krishna Mohan, B.H., Dhabliya, D., Raja, N.K. An Efficient Deep Learning Model with Interrelated Tagging Prototype with Segmentation for Telugu Optical Character Recognition (2022) Scientific Programming, 2022, art. no. 1059004
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.