Advertisement

Blockchain and Biometrics: A First Look into Opportunities and Challenges

  • Oscar Delgado-MohatarEmail author
  • Julian Fierrez
  • Ruben Tolosana
  • Ruben Vera-Rodriguez
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1010)

Abstract

Blockchain technology has become a thriving topic in the last years, making possible to transform old-fashioned operations to more fast, secured, and cheap approaches. In this study we explore the potential of blockchain for biometrics, analyzing how both technologies can mutually benefit each other. The contribution of this study is twofold: (1) we provide a short overview of both blockchain and biometrics, focusing on the opportunities and challenges that arise when combining them, and (2) we discuss in more detail blockchain for biometric template protection.

Keywords

Blockchain Biometrics Security Privacy Vulnerability 

Notes

Acknowledgements

Research supported by project BIBECA (RTI2018-101248-B-I00), UAM-CecaBank chair on Biometrics, and UAM-GrantThornton chair on Blockchain. Ruben Tolosana is supported by a FPU Fellowship from Spanish MECD.

References

  1. 1.
    Aggarwal, S., et al.: Energychain: enabling energy trading for smart homes using blockchains in smart grid ecosystem. In: Proceedings of SmartCitiesSecurity (2018)Google Scholar
  2. 2.
    Nicola, A., et al.: A survey of attacks on ethereum smart contracts SoK. In: Proceedings of International Conference on Principles of Security and Trust. Springer (2017)Google Scholar
  3. 3.
    Benet, J.: IPFS - Content Addressed, Versioned, P2P File System, July 2014Google Scholar
  4. 4.
    European Commission: Smart Borders: for an open and secure EU (2013)Google Scholar
  5. 5.
    Dannen, C.: Introducing Ethereum and Solidity: Foundations of Cryptocurrency and Blockchain Programming for Beginners. Apress, Berkeley (2017)CrossRefGoogle Scholar
  6. 6.
    Daugman, J.: 600 million citizens of India are now enrolled with biometric ID. SPIE Newsroom (2014)Google Scholar
  7. 7.
    Dziembowski, S., et al.: General state channel networks. In: Proceedings of ACM SIGSAC Conference on Computer and Communications Security, CCS 2018 (2018)Google Scholar
  8. 8.
    Eyal, I., Sirer, E.G.: Majority is not enough: Bitcoin mining is vulnerable. Commun. ACM 61(7), 95–102 (2018)CrossRefGoogle Scholar
  9. 9.
    Fierrez, J., et al.: Multiple classifiers in biometrics. part 2: trends and challenges. Inf. Fusion 44, 103–112 (2018)CrossRefGoogle Scholar
  10. 10.
    Gomez-Barrero, M., et al.: Multi-biometric template protection based on homomorphic encryption. Pattern Recogn. 67, 149–163 (2017)CrossRefGoogle Scholar
  11. 11.
    Gomez-Barrero, M., Galbally, J., Fierrez, J.: Efficient software attack to multimodal biometric systems and its application to face and iris fusion. Pattern Recogn. Lett. 36, 243–253 (2014)CrossRefGoogle Scholar
  12. 12.
    Gomez-Barrero, M., Galbally, J., Morales, A., Fierrez, J.: Privacy-preserving comparison of variable-length data with application to biometric template protection. IEEE Access 5, 8606–8619 (2017)CrossRefGoogle Scholar
  13. 13.
    Gordon, W.J., Catalini, C.: Blockchain technology for healthcare: facilitating the transition to patient-driven interoperability. Comput. Struct. Biotechnol. J. 16, 224–230 (2018)CrossRefGoogle Scholar
  14. 14.
    Hadid, A., Evans, N., Marcel, S., Fierrez, J.: Biometrics systems under spoofing attack: an evaluation methodology and lessons learned. IEEE Sig. Process. Mag. 32(5), 20–30 (2015)CrossRefGoogle Scholar
  15. 15.
    Jain, A.K., et al.: 50 years of biometric research: accomplishments, challenges, and opportunities. Pattern Recogn. Lett. 79, 80–105 (2016)CrossRefGoogle Scholar
  16. 16.
    Karande, V., et al.: SGX-log: securing system logs with SGX. In: Proceedings of ACM Asian Conference on Computer and Communications Security (2017)Google Scholar
  17. 17.
    Koens, T., Ramaekers, C., Van Wijk, C.: Efficient Zero-Knowledge Range Proofs in Ethereum. Technical Report (2018)Google Scholar
  18. 18.
    Küçük, K.A., et al.: Exploring the use of Intel SGX for secure many-party applications. In: Workshop on System Software for Trusted Execution (2016)Google Scholar
  19. 19.
    Magnani, A., et al.: Feather forking as a positive force: incentivising green energy production in a blockchain-based smart grid. In: ACM Workshop on Cryptocurrencies and Blockchains for Distributed Systems (2018)Google Scholar
  20. 20.
    Marcel, S., Nixon, M., Fierrez, J., Evans, N. (eds.): Handbook of Biometric Anti-Spoofing - Presentation Attack Detection, 2nd edn. Springer, Heidelberg (2019).  https://doi.org/10.1007/978-3-319-92627-8CrossRefGoogle Scholar
  21. 21.
    Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008)Google Scholar
  22. 22.
    Stokkink, Q., Pouwelse, J.A.: Deployment of a blockchain-based self-sovereign identity. CoRR, abs/1806.01926 (2018)Google Scholar
  23. 23.
    Swan, M.: Blockchain: Blueprint for a New Economy. O’Reilly, Sebastopol (2015)Google Scholar
  24. 24.
    Szabo, N.: Smart contracts: building blocks for digital markets (1996)Google Scholar
  25. 25.
    Zachary, J.: Williamson. The AZTEC Protocol. Technical Report (2018)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Oscar Delgado-Mohatar
    • 1
    Email author
  • Julian Fierrez
    • 1
  • Ruben Tolosana
    • 1
  • Ruben Vera-Rodriguez
    • 1
  1. 1.Escuela Politecnica SuperiorUniversidad Autonoma de MadridMadridSpain

Personalised recommendations