scholarly journals Implementation of Integrated Authentication Service using Blockchain and One Time QR Code for Access Control in U-city Environment

Author(s):  
Jai Yong Kim ◽  
Author(s):  
O. V. Samchyshyn ◽  
D. V. Perevizna

Emergence of new technologies and modernization of existing information technologies, development of information and telecommunication processing and storage systems have increase the level of information security, necessitating an increase of information security’s effectiveness with the complexity of data storage architecture. Security of information from unauthorized access is an essential measure to prevent material and non-material damage to its owner. So it is very important to take into account the efficiency of the subsystem of access control and data security in order to ensure security of some information system. Accordingly the threat of information leakage has made the means of information security and cyber security one of the mandatory characteristics of information and telecommunication systems and information security has become an integral part of professional function. Under conditions of the hybrid war of the Russian Federation against Ukraine? the number of cyber attacks on military information and telecommunication systems has increased. At the same time their technological complexity has increased too. This process necessitates the improvement of information security systems and the process of providing access to them by using modern types of users identification. Access control is an effective method of information security. It regulates the use of information system resources. User’s identification is an important and integral element of access control system. An analysis of modern types of users identification is presented in the paper. The technology of QR-code is considered: the principle of formation, the types of coding, the structure of elements, the advantages of its usage. The interconnection between its components was established. Prospects for further research are the development of an algorithm and software application for user identification to provide access by QR-code to information and telecommunication systems for military purposes.


Author(s):  
Yung-Wei Kao ◽  
Guo-Heng Luo ◽  
Hsien-Tang Lin ◽  
Yu-Kai Huang ◽  
Shyan-Ming Yuan

Author(s):  
George Petrea ◽  
Ciprian Vlad ◽  
Cătălin Aramă ◽  
Marian Crăciun ◽  
Bogdan Ionescu

Sign in / Sign up

Export Citation Format

Share Document