Leveraging Biometric Authentication and Blockchain Technology for Enhanced Security in Identity and Access Management Systems

Authors

  • Leeladhar Gudala Software Engineering Masters, Deloitte Consulting, Pennsylvania, USA
  • Amith Kumar Reddy Senior Software Developer, The PNC Financial Services Group Inc, Birmingham, Alabama, USA
  • Ashok Kumar Reddy Sadhu Software Engineer, Deloitte, Dallas, Texas, USA
  • Srinivasan Venkataramanan Senior Software Developer – American Tower Corporation, Woburn, Massachusetts, USA

Keywords:

Identity and Access Management (IAM), Biometric Authentication, Blockchain, Decentralization, Security, Privacy, Cryptography, Smart Contracts, Scalability, Mitigation Strategies

Abstract

The ever-expanding realm of digital interactions necessitates the development of robust Identity and Access Management (IAM) systems. Conventional password-based authentication mechanisms, while serving as the cornerstone for access control for decades, are demonstrably vulnerable to a plethora of cyberattacks, including phishing scams, credential stuffing, and brute-force attacks. This escalating vulnerability necessitates the exploration of more resilient authentication techniques. Biometric authentication, which leverages unique and measurable biological characteristics inherent to individuals, offers a significantly more robust solution compared to traditional password-based methods. However, concerns persist regarding the security of centralized data repositories that house biometric templates, as a data breach could compromise the entire system and render the biometric data unusable for future authentication.

This paper investigates the potential of integrating biometric authentication with blockchain technology to create a secure and decentralized IAM framework. Blockchain technology, underpinned by cryptography, distributed ledger systems, and a robust consensus mechanism, offers a paradigm shift in data management. By leveraging these attributes, blockchain technology can address the inherent limitations of centralized data storage in IAM systems. Integration with blockchain has the potential to bolster the security of IAM systems in several ways. First, blockchain's distributed ledger technology ensures immutability and tamper-proof data storage. Any modifications to the data ledger would be immediately detectable by all participants in the network, thereby significantly reducing the risk of unauthorized data alteration. Second, blockchain empowers users with greater control over their biometric data. By storing cryptographic hashes of biometric templates on the blockchain, rather than the raw data itself, user privacy is safeguarded. Users can then grant access to specific entities or applications through permissioned access control mechanisms. This decentralized approach eliminates the presence of a single point of failure, mitigating the potential consequences of a data breach.

Furthermore, this integrated approach offers the potential to streamline access control processes. Smart contracts, self-executing code stored on the blockchain, can be programmed to manage access privileges based on predefined rules and conditions. This not only reduces administrative overhead but also enhances the efficiency and accuracy of access control decisions.

References

A. Meneghetti, M. Raugei, and S. T. Habib, "A Framework for User Authentication with Fingerprint Biometrics and Blockchain Technology," in 2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC), pp. 1780-1785, Oct. 2018. [IEEE Xplore]

Y. Lee and J. Jeong, "Blockchain-based Secure User Authentication System using Facial Recognition," Journal of Information Processing Systems, vol. 15, no. 2, pp. 557-569, 2019. [DOI]

S. Gao, J. Ning, W. Liu, and W. Huang, "Secure Access Control with Iris Recognition Based on Consortium Blockchain for Internet of Things," IEEE Access, vol. 7, pp. 147019-147032, 2019. [IEEE Xplore]

M. Nikkhah, M. A. Jalil, and S. H. Noordin, "Blockchain-Enabled Secure Voice Recognition System for E-government Services," IEEE Access, vol. 8, pp. 11835-11847, 2020. [IEEE Xplore]

A. Shafa, M. N. Aman, M. F. A. Hossain, M. A. Mahmud, and K. H. Islam, "Towards a Secure and Decentralized Identity Management Framework Using Blockchain Technology," IEEE Access, vol. 7, pp. 140222-140235, 2019. [IEEE Xplore]

X. Chen, J. Li, J. Weng, and J. Xiang, "A Cross-Domain Identity Authentication Scheme Using Consortium Blockchain for Secure Healthcare Data Access," IEEE Journal of Biomedical and Health Informatics, vol. 24, no. 8, pp. 2230-2240, 2020. [IEEE Xplore]

M. Razzaque, M. S. Khan, and H. Khurshid, "Blockchain-Based Secure and Efficient Decentralized Identity Management System," IEEE Access, vol. 8, pp. 18213-18228, 2020. [IEEE Xplore]

M. Grieger, "Blockchain and Biometrics: A Perfect Match? A Critical Analysis," arXiv preprint arXiv:2302.10883, 2021. [arXiv]

J. Zhang, N. Wang, D. He, Z. Wang, X. Dong, and Y. Ren, "A Secure and Efficient Identity-Based Cryptography for Blockchain in Decentralized Identity Management," IEEE Access, vol. 6, pp. 11220-11232, 2018. [IEEE Xplore]

A. Khalid, S. Khan, M. A. Khan, and S. Lee, "A Lightweight Blockchain-Based Digital Identity Management System for E-Healthcare Applications," IEEE Access, vol. 8, pp. 171222-171235, 2020. [IEEE Xplore]

N. Hassan, S. Zhao, S. A. Madani, and M. Hammoudi, "Decentralized Identity Management Using Self-Sovereign Identity and Blockchain Technology," IEEE Transactions on Engineering Management, pp. 1-11, 2021. [IEEE Xplore]

J. Jang, J. Kim, J. Park, and S. Moon, "Blockchain-Based Decentralized Identity Management for Secure Medical Information Sharing," IEEE Access, vol. 7, pp. 142226-142237, 2019. [IEEE Xplore]

A. Banerjee, S. R. Choudhury, S. Roy, and S. Misra, "Secure and Decentralized Identity and Access Management (SIAM) Using Blockchain for IoT-Based Supply Chains," IEEE Internet of Things Journal, vol. 8, no. 11, pp. 9221-9232, 2021. [IEEE Xplore]

A. Khalid, S. Khan, M. A. Khan, and S. Lee, "Towards Secure and Efficient Decentralized Identity Management in Fog Computing using Blockchain," IEEE Transactions on Sustainable Computing, vol. 13, no. 4, pp. 2327

Downloads

Published

21-09-2022

How to Cite

[1]
L. Gudala, A. Kumar Reddy, A. Kumar Reddy Sadhu, and S. Venkataramanan, “Leveraging Biometric Authentication and Blockchain Technology for Enhanced Security in Identity and Access Management Systems”, J. of Art. Int. Research, vol. 2, no. 2, pp. 21–50, Sep. 2022.