Skip to main content
Log in

Blockchain-based mobile fingerprint verification and automatic log-in platform for future computing

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

Door locks and user authentication are the major issues in the current banking industry. There are a number of user future computing techniques, and security is especially essential to these methods. Existing digital door locks have the problem of opening easily with a stolen PIN number or by electrical shock. Thus, this study proposed and implemented an integrated automatic log-in platform based on mobile fingerprint recognition by applying the blockchain theory. As a result of this research, a convenient, integrated automatic log-in platform with powerful security has been constructed using a smartphone-based fingerprint recognition function. There are three major functions of the platform. First, it is possible to authenticate the user in PC, mobile device, and IoT environments through fingerprint recognition. Second, the platform includes SDK to develop application software for user authentication and IoT services. Last is its strengthened security using the blockchain theory to prepare against tampering/forging/leaking of a user’s fingerprint information by hackers.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

References

  1. Schutzer D (2016) CTO corner: what is a Blockchain and why is it important? FSRoundtable. Retrieved from http://fsroundtable.org/cto-corner-what-is-a-blockchainand-why-is-it-important/. Accessed 1 June 2018

  2. Kestenbaum R (2017) Why bitcoin is important for your business. Forbes. Retrieved from https://www.forbes.com/sites/richardkestenbaum/2017/03/14/why-bitcoinis-important-for-your-business/3/#2da6d4c72b3b. Accessed 1 June 2018

  3. Due.com. (2017) How blockchain improves security and transaction times. Nasdaq. Retrieved from http://www.nasdaq.com/article/how-blockchain-improves-securityand-transaction-times-cm771339. Accessed 1 June 2018

  4. Higgins S (2016) Hours after launch, OpenBazaar sees first drug listings. CoinDesk. Retrieved from http://www.coindesk.com/drugs-contraband-openbazaar/. Accessed 1 June 2018

  5. Young J (2016) Hackers eye e-commerce platforms, bitcoin-based OpenBazaar to capitalize. The Cointelegraph. Retrieved from https://cointelegraph.com/news/hackerseye-e-commerce-platforms-bitcoin-based-openbazaar-to-capitalize. Accessed 1 June 2018

  6. Tech (2017) Kaspersky releases more evidence that North Korea was linked to Bangladesh SWIFT hack. Retrieved from http://tech.firstpost.com/news-analysis/kasperskyreleases-more-evidence-that-north-korea-was-linked-to-bangladesh-swift-hack-370229.html. Accessed 1 June 2018

  7. Baker M (2017) Why SWIFT’s days are numbered, and what’s next. MSPmentor. Retrieved from http://mspmentor.net/technologies/why-swift-s-days-are-numberedand-what-s-next. Accessed 1 June 2018

  8. Coward J (2016) Meet the visionary who brought blockchain to the industrial IoT. IOT World News. Retrieved from http://www.iotworldnews.com/author.asp?section_id=495&doc_id=728962. Accessed 1 June 2018

  9. Etzioni A (2015) A cyber age privacy doctrine: more coherent, less subjective, and operational. Brooklyn Law Rev 80(4):1263–1265

    Google Scholar 

  10. Mayer-Sch€onberger V, Cukier K (2013) Big data: a revolution that will transform how we live, work and think. Houghton Mifflin Harcourt, Boston

    Google Scholar 

  11. Kshetri N (2014) Big data’s impact on privacy, security and consumer welfare. Telecommun Policy 38:1134–1145

    Article  Google Scholar 

  12. Seth S (2017) Banks need to be centralized—could blockchain be the answer? Finance Magnates. http://www.financemagnates.com/cryptocurrency/bloggers/banksneed-centralized-blockchain-answer/. Accessed 1 June 2018

  13. Mainelli M (2017) Blockchain will help us prove our identities in a digital world. Harvard Business Review. Retrieved from https://hbr.org/2017/03/blockchain-willhelp-us-prove-our-identities-in-a-digital-world. Accessed 1 June 2018

  14. Kshetri N (2017) Blockchain’s roles in strengthening cybersecurity and protecting privacy. Telecommun Policy 41:1027–1038

    Article  Google Scholar 

  15. Sharma PK, Moon SY, Park JH (2017) Block-VN: a distributed blockchain based vehicular network architecture in smart city. J Inf Process Syst 13(1):184–195

    Google Scholar 

  16. Sharma PK et al (2017) DistBlockNet: a distributed blockchains-based secure SDN architecture for IoT networks. IEEE Commun Mag IEEE 55(9):78–85

    Article  Google Scholar 

  17. Sharma PK, Chen MY, Park JH (2018) A software defined fog node based distributed blockchain cloud architecture for IoT. IEEE Access 6:115–124

    Article  Google Scholar 

  18. Bahga A, Madisetti VK (2016) Blockchain platform for industrial internet of things. J Softw Eng Appl 9(10):533–546

    Article  Google Scholar 

  19. Christidis K, Devetsikiotis M (2016) Blockchains and smart contracts for the internet of things. IEEE Access 4:2292–2303

    Article  Google Scholar 

  20. Xia Q et al (2017) MeDShare: trust-less medical data sharing among cloud service providers via Blockchain. IEEE Access 5:14757–14767

    Article  Google Scholar 

  21. Li Z et al (2017) Consortium blockchain for secure energy trading in industrial internet of things. IEEE Trans Industr Inform 278–307

  22. Sharma PK, Park JH (2018) Blockchain based hybrid network architecture for the smart city. Future Gener Comput Syst 1–6

  23. Bank of Korea (2016) Development strategy of digital innovation and payment service. In: Bank of Korea Payment and Settlement System Conference, pp 1–4 (in Korean)

  24. Gartner (2016) Retrieved from http://www.gartner.com/events/na/orlando-symposium/

  25. Nakamoto S (2008) Bitcoin: a peer-to-peer electronic cash system, pp 1–9

  26. Antonopoulos AM (2014) Mastering bitcoin: unlocking digital cryptocurrencies. O’Reilly Media Inc., Sebastopol, pp 1–73

    Google Scholar 

  27. Beverly Y, Garcia-Molina H (2003) PPay: micropayments for peer-to-peer systems. In: Proceedings of the 10th ACM Conference on Computer and Communications Security. ACM, pp 300–310

  28. Yoo HW (2016) Implementation and performance improvement plan of blockchain-based electronic ballot system. Graduate School of Information and Communication, Ajou University, Suwon, pp 1–34 (in Korean)

    Google Scholar 

  29. Kim SH, Yang JY, Kim YJ (2015) A study on the selfish mining of blockchain. In: 2015 Autumn Conference. The Korean Institute of Communications and Information Sciences, pp 1–4 (in Korean)

  30. Cheon IG (2015) Android programming, easy explanations with pictures. Rev (3). Life and Power Press (in Korean)

  31. Peters GW, Panayi E, Chapelle A (2015) Trends in crypto-currencies and Blockchain technologies: a monetary theory and regulation perspective. J Financ Perspect 3(3):1–43

    Google Scholar 

  32. Gervais A, Karame GO, Wüst K, Glykantzis V, Ritzdorf H, Capkun S (2016) On the security and performance of proof of work blockchains. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, pp 3–16

  33. Underwood S (2016) Blockchain beyond bitcoin. Commun ACM 59(11):15–17

    Article  Google Scholar 

  34. Zyskind G, Nathan O (2015) Decentralizing privacy: using blockchain to protect personal data. In: Security and Privacy Workshops (SPW). IEEE, pp 180–184

  35. Kiayias A, Koutsoupias E, Kyropoulou M, Tselekounis Y (2016) Blockchain mining games. In: Proceedings of the 2016 ACM Conference on Economics and Computation. ACM, pp 365–382

  36. Huh J-H, Seo K (2016) Design and test bed experiments of server operation system using virtualization technology. Hum Centric Comput Inf Sci 6(1):1–21

    Article  Google Scholar 

  37. Huh J-H, Otgonchimeg S, Seo K (2016) Advanced metering infrastructure design and test bed experiment using intelligent agents: focusing on the PLC network base technology for smart grid system. J Supercomput 72(5):1862–1877

    Article  Google Scholar 

  38. Huh J-H (2017) PLC-based design of monitoring system for ICT-integrated vertical fish farm. Hum Centric Comput Inf Sci 7(20):1–19

    Google Scholar 

  39. Moon S-Y, Park J-H (2016) Efficient hardware-based code convertor of a quantum computer. J Converg 7:1–9

    Google Scholar 

  40. Nagaraju S, Parthiban L (2015) Trusted framework for online banking in public cloud using multi-factor authentication and privacy protection gateway. J Cloud Comput Adv Syst Appl 4(1):1–23

    Article  Google Scholar 

  41. Massias H, Avila XS, Quisquater J-J (1999) Design of a secure timestamping service with minimal trust requirements. In: 20th Symposium on Information Theory in the Benelux, pp 1–8

  42. Haber S, Stornetta WS (1991) How to time-stamp a digital document. In: Conference on the Theory and Application of Cryptography. Springer, pp 437–455

  43. Bayer D, Haber S, Stornetta WS (1993) Improving the efficiency and reliability of digital time-stamping. Seq II: Methods Commun Secur Comput Sci 329–334

  44. Haber S, Stornetta WS (1997) Secure names for bit-strings. In: Proceedings of the 4th ACM Conference on Computer and Communications Security. ACM, pp 28–35

  45. Huh J-H, Seo K (2017) Design and implementation of mobile fingerprint recognition and automatic log-in platform framework. BIC 2017:1

    Google Scholar 

Download references

Acknowledgements

The first draft of this paper was presented at The International Conference on Big data, IoT, and Cloud Computing (BIC 2017) [45], August 22–24, 2017, Republic of Korea. This work was supported by the National Research Foundation of Korea (NRF) Grant funded by the Korea government (MSIT) (No. 2017R1C1B5077157).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kyungryong Seo.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Huh, JH., Seo, K. Blockchain-based mobile fingerprint verification and automatic log-in platform for future computing. J Supercomput 75, 3123–3139 (2019). https://doi.org/10.1007/s11227-018-2496-1

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-018-2496-1

Keywords

Navigation