Author : Saketh S Meka 1
Date of Publication :28th July 2021
Abstract: Blockchain is an expanding list of records, called blocks, that are linked using cryptography. Each block contains a cryptographic hash of the previous block, a timestamp, and transaction data. By design, a blockchain is resistant to modification of the data.To counter these problems of traditional databases, blockchain technology can be used instead. Blockchain technology is a decentralised storage network, where each data of each user/ customer is stored in blocks within their host systems, but the difference here is that, each block is connected with each other over the decentralized network using the hash values. Credential Verification is performed to check if the customer is original. Usual applications of customer profiling are done in the bank and security sector, where every new customer or user must undergo a background validation before his/her data is stored on the database. In usual practice, all the data collected by the banks are stored in a single, centrally controlled database. There are numerous disadvantages of the current system of storage of data. It is easy for the hackers to break through the database security and get all the customer’s all details. Once the hacker or any unauthorized user accesses any one rows of the database, that person can access the entire database of sensitive information. In order to tackle this problem, one solution is to use decentralized blockchain technology replacing the old centrally owned database system. In this technology, every user’s data will be stored in the blockchain. How blockchain works is that each block contains some data and using a cryptographic technique called secured hash algorithm 256 (sha256), the hash value of length 256 bits is calculated for every block. This hash value of a particular block is stored inside the next block, creating the blockchain. The use of blockchain here provides immense security as if the data of the block is accessed without authorization, and if the data is changed, the entire hash value for the block will be changed, and when this happens that particular block will get disconnected from the chain, and hence give an error signal. The blocks are stored in a server, but no human intervention can actually access these blocks, but only smart contract code blocks can access the blocks. Once the data is stored on the blockchain, it cannot be modified without authorization from the user. To use blockchain with authentication, facial recognition and audio recognition are used as security measures. The facial recognition model was trained using SVM and KNN for comparison purpose. KNN approach gave an accuracy of 96 % whereas the SVM approach gave an accuracy of 98%. The threshold for distance calculation was 0.58, at which it gave the maximum accuracy. Also the blockchain creation was done using python and hash for every block was calculated using SHA-256. Audio recognition was performed using Multi-Layer Perceptron model. An accuracy of 88 percent was achieved.
Reference :
-
- Chaturvedi, K. and Vishwakarma, D.K., 2020, January. Face Recognition in an Unconstrained Environment using ConvNet. In Proceedings of the 2020 2nd International Conference on Big Data Engineering and Technology (pp. 67-71).
- R. Rivera, J. G. Robledo, V. M. Larios and J. M. Avalos, ”How digital identity on blockchain can contribute in a smart city environment,” International Smart Cities Conference (ISC2), Wuxi, pp. 1-4, 2019.
- Kuperberg, Michael. ”Blockchain-based identity management: A survey from the enterprise and ecosystem perspective.” IEEE Transactions on Engineering Management 67.4 (2019): 1008-1027
- Q. Stokkink and J. Pouwelse, ”Deployment of a Blockchain-Based Self-Sovereign Identity,” 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Halifax, NS, Canada, pp. 1336-1342, 2018.
- Aradhana, Dr. S. M. Ghosh, “Secure Hash and Its Variants”, second International Conference on Contemporary Computing and Informatics, 2016.
- Hirotaka Yoshida, Alex Biryukov, “Analysis of SHA256 variant”, National Institute of Advanced Industrial Science and technology conference August 2015. [7] A. R. S. Siswanto, A. S. Nugroho and M. Galinium, ”Implementation of face recognition algorithm for biometrics based time attendance system,” 2014 International Conference on ICT for Smart Society (ICISS), Bandung, pp. 149-154, 2014.
- J. K. Khan and D. Upadhyay, ”Security issues in face recognition,” 2017 5th International Conference - Confluence the Next Generation Information Technology Summit (Confluence), Noida, pp. 719- 725, 2017.
- Neena Aloysius, Geetha M, “A Review on Deep Convolutional Neural Networks”, IEEE International Conference on Communication and Signal Processing (ICCSP), pp. 588 – 592, 2019.
- D. H. Hubel and T. N. Wiesel, “Receptive fields and functional architecture of monkey striate cortex”, The Journal of physiology, pp. 215 – 243, 2017.
- A. Songara, L. Chouhan, “Blockchain: A Decentralized Technique for Securing Internet of Things”. Conference paper, October 2017.
- A. Abdullah, R. Hamad, M. Abdulrahman, H. Moala and S. Elkhediri, ”CyberSecurity: A Review of Internet of Things (IoT) Security Issues, Challenges and Techniques,” 2019 2nd International Conference on Computer Applications Information Security (ICCAIS), Riyadh, Saudi Arabia, pp. 1-6, 2019.
- Maria Rona L. Perez, Dr. Bobby Gerardo, “Modified SHA256 for Securing Online Transactions based on Blockchain Mechanism”, Technological Institute of the Philippines Aurora Blvd, 2018.
- Peters, Panayi, “Understanding modern banking ledgers through Blockchain Technologies: Future of transaction processing and smart contracts on the internet of money”, University College London, 2018.
- D. Augot, H. Chabanne, O. Cl emot and . George, ”Transforming Face-to-Face Identity Proofing into Anonymous Digital Identity Using the Bitcoin Blockchain,” 2017 15th Annual Conference on Privacy, Security and Trust (PST), Calgary, AB, pp. 25-2509, 2019.
- Sachchidanand Singh, Nirmala Singh, “Blockchain: Future of Financial and Cyber Security “, 2nd International Conference on Contemporary Computing and Informatics, 2017.