Leveraging Biometric Authentication and Blockchain Technology for Enhanced Security in Identity and Access Management Systems
Keywords:
Identity and Access Management (IAM), Biometric Authentication, Blockchain, Decentralization, Security, Privacy, Cryptography, Smart Contracts, Scalability, Mitigation StrategiesAbstract
The ever-expanding realm of digital interactions necessitates the development of robust Identity and Access Management (IAM) systems. Conventional password-based authentication mechanisms, while serving as the cornerstone for access control for decades, are demonstrably vulnerable to a plethora of cyberattacks, including phishing scams, credential stuffing, and brute-force attacks. This escalating vulnerability necessitates the exploration of more resilient authentication techniques. Biometric authentication, which leverages unique and measurable biological characteristics inherent to individuals, offers a significantly more robust solution compared to traditional password-based methods. However, concerns persist regarding the security of centralized data repositories that house biometric templates, as a data breach could compromise the entire system and render the biometric data unusable for future authentication.
This paper investigates the potential of integrating biometric authentication with blockchain technology to create a secure and decentralized IAM framework. Blockchain technology, underpinned by cryptography, distributed ledger systems, and a robust consensus mechanism, offers a paradigm shift in data management. By leveraging these attributes, blockchain technology can address the inherent limitations of centralized data storage in IAM systems. Integration with blockchain has the potential to bolster the security of IAM systems in several ways. First, blockchain's distributed ledger technology ensures immutability and tamper-proof data storage. Any modifications to the data ledger would be immediately detectable by all participants in the network, thereby significantly reducing the risk of unauthorized data alteration. Second, blockchain empowers users with greater control over their biometric data. By storing cryptographic hashes of biometric templates on the blockchain, rather than the raw data itself, user privacy is safeguarded. Users can then grant access to specific entities or applications through permissioned access control mechanisms. This decentralized approach eliminates the presence of a single point of failure, mitigating the potential consequences of a data breach.
Furthermore, this integrated approach offers the potential to streamline access control processes. Smart contracts, self-executing code stored on the blockchain, can be programmed to manage access privileges based on predefined rules and conditions. This not only reduces administrative overhead but also enhances the efficiency and accuracy of access control decisions.
References
A. Meneghetti, M. Raugei, and S. T. Habib, "A Framework for User Authentication with Fingerprint Biometrics and Blockchain Technology," in 2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC), pp. 1780-1785, Oct. 2018. [IEEE Xplore]
Y. Lee and J. Jeong, "Blockchain-based Secure User Authentication System using Facial Recognition," Journal of Information Processing Systems, vol. 15, no. 2, pp. 557-569, 2019. [DOI]
S. Gao, J. Ning, W. Liu, and W. Huang, "Secure Access Control with Iris Recognition Based on Consortium Blockchain for Internet of Things," IEEE Access, vol. 7, pp. 147019-147032, 2019. [IEEE Xplore]
M. Nikkhah, M. A. Jalil, and S. H. Noordin, "Blockchain-Enabled Secure Voice Recognition System for E-government Services," IEEE Access, vol. 8, pp. 11835-11847, 2020. [IEEE Xplore]
A. Shafa, M. N. Aman, M. F. A. Hossain, M. A. Mahmud, and K. H. Islam, "Towards a Secure and Decentralized Identity Management Framework Using Blockchain Technology," IEEE Access, vol. 7, pp. 140222-140235, 2019. [IEEE Xplore]
X. Chen, J. Li, J. Weng, and J. Xiang, "A Cross-Domain Identity Authentication Scheme Using Consortium Blockchain for Secure Healthcare Data Access," IEEE Journal of Biomedical and Health Informatics, vol. 24, no. 8, pp. 2230-2240, 2020. [IEEE Xplore]
M. Razzaque, M. S. Khan, and H. Khurshid, "Blockchain-Based Secure and Efficient Decentralized Identity Management System," IEEE Access, vol. 8, pp. 18213-18228, 2020. [IEEE Xplore]
M. Grieger, "Blockchain and Biometrics: A Perfect Match? A Critical Analysis," arXiv preprint arXiv:2302.10883, 2021. [arXiv]
J. Zhang, N. Wang, D. He, Z. Wang, X. Dong, and Y. Ren, "A Secure and Efficient Identity-Based Cryptography for Blockchain in Decentralized Identity Management," IEEE Access, vol. 6, pp. 11220-11232, 2018. [IEEE Xplore]
A. Khalid, S. Khan, M. A. Khan, and S. Lee, "A Lightweight Blockchain-Based Digital Identity Management System for E-Healthcare Applications," IEEE Access, vol. 8, pp. 171222-171235, 2020. [IEEE Xplore]
N. Hassan, S. Zhao, S. A. Madani, and M. Hammoudi, "Decentralized Identity Management Using Self-Sovereign Identity and Blockchain Technology," IEEE Transactions on Engineering Management, pp. 1-11, 2021. [IEEE Xplore]
J. Jang, J. Kim, J. Park, and S. Moon, "Blockchain-Based Decentralized Identity Management for Secure Medical Information Sharing," IEEE Access, vol. 7, pp. 142226-142237, 2019. [IEEE Xplore]
A. Banerjee, S. R. Choudhury, S. Roy, and S. Misra, "Secure and Decentralized Identity and Access Management (SIAM) Using Blockchain for IoT-Based Supply Chains," IEEE Internet of Things Journal, vol. 8, no. 11, pp. 9221-9232, 2021. [IEEE Xplore]
A. Khalid, S. Khan, M. A. Khan, and S. Lee, "Towards Secure and Efficient Decentralized Identity Management in Fog Computing using Blockchain," IEEE Transactions on Sustainable Computing, vol. 13, no. 4, pp. 2327
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
License Terms
Ownership and Licensing:
Authors of this research paper submitted to the journal owned and operated by The Science Brigade Group retain the copyright of their work while granting the journal certain rights. Authors maintain ownership of the copyright and have granted the journal a right of first publication. Simultaneously, authors agreed to license their research papers under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) License.
License Permissions:
Under the CC BY-NC-SA 4.0 License, others are permitted to share and adapt the work, as long as proper attribution is given to the authors and acknowledgement is made of the initial publication in the Journal. This license allows for the broad dissemination and utilization of research papers.
Additional Distribution Arrangements:
Authors are free to enter into separate contractual arrangements for the non-exclusive distribution of the journal's published version of the work. This may include posting the work to institutional repositories, publishing it in journals or books, or other forms of dissemination. In such cases, authors are requested to acknowledge the initial publication of the work in this Journal.
Online Posting:
Authors are encouraged to share their work online, including in institutional repositories, disciplinary repositories, or on their personal websites. This permission applies both prior to and during the submission process to the Journal. Online sharing enhances the visibility and accessibility of the research papers.
Responsibility and Liability:
Authors are responsible for ensuring that their research papers do not infringe upon the copyright, privacy, or other rights of any third party. The Science Brigade Publishers disclaim any liability or responsibility for any copyright infringement or violation of third-party rights in the research papers.