Permission Blockchain based Smart Contract Utilizing Biometric Authentication as a Service: A Future Trend

Author(s):  
Geetanjali Sawant ◽  
Vinayak Bharadi
2021 ◽  
Vol 8 (1) ◽  
pp. 1-11
Author(s):  
Eduardo Takeo Ueda ◽  
Marcelo Moro Da Silva ◽  
Anderson Aparecido Alves Da Silva ◽  
Norisvaldo Ferraz Junior ◽  
Fabio Dacêncio Pereira ◽  
...  

Transparency and security in an electoral process are fundamental to the legitimacy of the results and the confidence of voters. Thus, it is necessary to assess opportunities to improve traditional voting systems. Among the main problems is the lack of transparency, due to the impossibility of a voter checking their vote and the lack of access to the source from which the results are obtained. Another problem is mobility, due to the impossibility of performing remote voting, as traditional voting systems continue to require the physical presence of the voter in an electoral zone. Thus, the objective of this work is to propose a voting system that is functional, transparent, safe, and accessible to everyone. Voters can vote through a mobile application with biometric authentication using fingerprint and password access. In our proposal, votes are registered in an Ethereum Blockchain through a Smart Contract, allowing the voter to check their vote. The results are expected to collaborate with the evolution of studies necessary to improve traditional voting systems, especially in fundamental aspects such as security, transparency, and mobility.


2019 ◽  
Vol 5 (1) ◽  
pp. 15-22
Author(s):  
Ardian Thresnantia Atmaja

The key objectives of this paper is to propose a design implementation of blockchain based on smart contract which have potential to change international mobile roaming business model by eliminating third-party data clearing house (DCH). The analysis method used comparative analysis between current situation and target architecture of international mobile roaming business that commonly used by TOGAF Architecture Development Method. The purposed design of implementation has validated the business value by using Total Cost of Ownership (TCO) calculation. This paper applies the TOGAF approach in order to address architecture gap to evaluate by the enhancement capability that required from these three fundamental aspect which are Business, Technology and Information. With the blockchain smart contract solution able to eliminate the intermediaries Data Clearing House system, which impacted to the business model of international mobile roaming with no more intermediaries fee for call data record (CDR) processing and open up for online billing and settlement among parties. In conclusion the business value of blockchain implementation in the international mobile roaming has been measured using TCO comparison between current situation and target architecture that impacted cost reduction of operational platform is 19%. With this information and understanding the blockchain technology has significant benefit in the international mobile roaming business.


2020 ◽  
Vol 2020 (8) ◽  
pp. 47-52
Author(s):  
Nataliya Kuznetsova ◽  
Tatyana Karlova ◽  
Aleksandr Bekmeshov

The work purpose consists in the efficiency increase of automated system operation for industrial enterprise resource protection at the expense of the optimization of authentication method application, in particular, biometric one. To achieve the purpose it is necessary to solve the problem of efficient joint use of modern authentication methods, particularly, a static and dynamic biometric authentication. But biometric methods are most expensive from the point of view of their realization. In this connection, within the limits of the paper there is carried out the analysis of modern methods of biological authentication from the point of view of a special order of introduction and joint use. In the paper there is shown a classification of static and dynamic methods for biometric authentication, an example of method combination in the authentication module is presented, there are considered and analyzed the latest methods, in particular, those based on DNA investigations, thermograms of a face and hands (static), gestures (dynamic). The work novelty consists in the presented diagram of authentication module operation. As a conclusion it should be noted that modern authentication systems offer the application of a complex approach: use both biometric methods and other ones for authentication in modules, in particular, based on secret knowledge and material carrier possession. The approach mentioned will allow minimizing the errors of the first and the second kinds, increasing a general level of safety.


Sign in / Sign up

Export Citation Format

Share Document