Biometric data: new opportunities and risks
DOI:
https://doi.org/10.47813/2782-2818-2023-3-3-0201-0211Keywords:
biometric data, personal data protection, risks, opportunities, protection methods, multifactor authentication, falsification, leakage, usage control, personal information.Abstract
The issues of personal data protection when using biometric technologies are considered, since regardless of whether a fingertip, face or iris is scanned, the information collected is personal information about the identified person. New possibilities of biometrics and its application in different spheres of life such as finance, medicine, security, etc. are analyzed. The most common example of biometrics is the photograph used in a passport, driver's license or medical card. Simply put, an image of a person's face is captured and stored in order to later compare it to another photo or to a living person. The article also covers the risks associated with the use of biometric data, such as the possibility of leakage, falsification and misuse not only in a centralized mechanism of access to various facilities, but also at each individual access point. Methods for protecting biometric data such as encryption and the use of multi-factor or two-factor authentication are presented. Recommendations are given for protecting personal information and controlling its use when deploying any technology or service that utilizes biometrics.
References
Kshetri N. Blockchain’s roles in meeting key supply chain management objectives. Int. J. of Inf. Management. 2018; 39: 80-89. https://doi.org/10.1016/j.ijinfomgt.2017.12.005
Huseyin G.T. Gurkan I. Facet-to-facet grouping: A clustering approach to enrich blockchain-based group operations. Inf. Sciences. 2020; 522: 99-125.
Borek A., Tiwari A. Smart contracts as instruments for business process management. Inf. Systems Frontiers. 2018; 20: 1-17.
Eisenhardt K.M., Graebner M.E. Theory building from cases: Opportunities and challenges. Academy of Management Journal. 2007; 50(1): 25-32. https://doi.org/10.5465/amj.2007.24160888
Аверьянов В.С., Карцан И.Н. Методы оценки защищенности автоматизированных систем на базе квантовых технологий согласно CVSSV2.0/V3.1. Защита информации. Инсайд. 2023; 1(109): 18-23.
Карцан И.Н., Жуков А.О. Механизм защиты промышленной сети. Информационные и телекоммуникационные технологии. 2021; 52: 19-26.
Аверьянов В.С., Карцан И.Н. Безопасность ключевой последовательности по протоколу Чарльза Беннета. В сборнике: Российская наука, инновации, образование - РОСНИО-2022. 2022; 72-75.
Flint D. Strategic marketing in global supply chains: Four challenges. Industrial Marketing Management. 2004; 33: 45–50. https://doi.org/10.1016/j.indmarman.2003.08.009
Карцан И.Н., Контылева Е.А. Глубокий интернет вещей. Современные инновации, системы и технологии - Modern Innovations, Systems and Technologies. 2023; 3(2): 0201–0212. https://doi.org/10.47813/2782-2818-2023-3-2-0201-0212
Жуков А.О., Карцан И.Н., Аверьянов В.С. Кибербезопасность Арктической зоны. Информационные и телекоммуникационные технологии. 2021; 51: 9-13.
Goldbach M., Seuring S., Back S. Coordinating sustainable cotton chains for the mass market –The case of the German mail order business OTT. Greener Management International. 2003; 43; 65–78. https://doi.org/10.9774/GLEAF.3062.2003.au.00008
Golder P.N. Historical method in marketing research with new evidence on long-term market share stability. Journal of Marketing Research. 2000; 37(2): 156–172. https://doi.org/10.1509/jmkr.37.2.156.18732
Ahmed M., Mahmood A.N., Islam M.R. A survey of anomaly detection techniques in financial domain. Future Gener. Comput. Syst. 2016; 55: 278-288. https://doi.org/10.1016/j.future.2015.01.001
Карцан Р.В., Карцан И.Н. Дактилоскопия биометрический метод идентификации на режимном предприятии. Актуальные проблемы авиации и космонавтики. 2013; 1(9): 405-406.
Mishra P., Pilli E.S., Varadharajan V., Tupakula U. Intrusion detection techniques in cloud environment: A survey. J. Netw. Comput. Appl. 2017; 77: 18-47. https://doi.org/10.1016/j.jnca.2016.10.015
Chang D., Ghosh M., Sanadhya S.K., Singh M., White D.R. FbHash: A new similarity hashing scheme for digital forensics. Digit. Invest. 2019; 29: S113-S123. https://doi.org/10.1016/j.diin.2019.04.006
Ahmed M., Mahmood A.N., Islam M.R. A survey of anomaly detection techniques in financial domain. Future Gener. Comput. Syst. 2016; 55: 278-288. https://doi.org/10.1016/j.future.2015.01.001
Сухостат В.В. Теория информационной безопасности и методология защиты информации. СПб: Университет ИТМО; 2018.
REFERENCES
Kshetri N. Blockchain’s roles in meeting key supply chain management objectives. Int. J. of Inf. Management. 2018; 39: 80-89. https://doi.org/10.1016/j.ijinfomgt.2017.12.005 DOI: https://doi.org/10.1016/j.ijinfomgt.2017.12.005
Huseyin G.T. Gurkan I. Facet-to-facet grouping: A clustering approach to enrich blockchain-based group operations. Inf. Sciences. 2020; 522: 99-125.
Borek A., Tiwari A. Smart contracts as instruments for business process management. Inf. Systems Frontiers. 2018; 20: 1-17.
Eisenhardt K.M., Graebner M.E. Theory building from cases: Opportunities and challenges. Academy of Management Journal. 2007; 50(1): 25–32. https://doi.org/10.5465/amj.2007.24160888 DOI: https://doi.org/10.5465/amj.2007.24160888
Aver'yanov V.S., Karcan I.N. Metody ocenki zashchishchennosti avtomatizirovannyh sistem na baze kvantovyh tekhnologij soglasno CVSSV2.0/V3.1. Zashchita informacii. Insajd. 2023; 1(109): 18-23. (in Russian).
Karcan I.N., Zhukov A.O. Mekhanizm zashchity promyshlennoj seti. Informacionnye i telekommunikacionnye tekhnologii. 2021; 52: 19-26. (in Russian).
Aver'yanov V.S., Karcan I.N. Bezopasnost' klyuchevoj posledovatel'nosti po protokolu CHarl'za Benneta. V sbornike: Rossijskaya nauka, innovacii, obrazovanie - ROSNIO-2022. 2022; 72-75. (in Russian).
Flint D. Strategic marketing in global supply chains: Four challenges. Industrial Marketing Management. 2004; 33: 45–50. https://doi.org/10.1016/j.indmarman.2003.08.009 DOI: https://doi.org/10.1016/j.indmarman.2003.08.009
Karcan I.N., Kontyleva E.A. Glubokij internet veshchej. Sovremennye innovacii, sistemy i tekhnologii - Modern Innovations, Systems and Technologies. 2023; 3(2): 0201–0212. https://doi.org/10.47813/2782-2818-2023-3-2-0201-0212 (in Russian). DOI: https://doi.org/10.47813/2782-2818-2023-3-2-0201-0212
Zhukov A.O., Karcan I.N., Aver'yanov V.S. Kiberbezopasnost' Arkticheskoj zony. Informacionnye i telekommunikacionnye tekhnologii. 2021; 51: 9-13. (in Russian).
Goldbach M., Seuring S., Back S. Coordinating sustainable cotton chains for the mass market –The case of the German mail order business OTT. Greener Management International. 2003; 43; 65–78. https://doi.org/10.9774/GLEAF.3062.2003.au.00008 DOI: https://doi.org/10.9774/GLEAF.3062.2003.au.00008
Golder P.N. Historical method in marketing research with new evidence on long-term market share stability. Journal of Marketing Research. 2000; 37(2): 156–172. https://doi.org/10.1509/jmkr.37.2.156.18732 DOI: https://doi.org/10.1509/jmkr.37.2.156.18732
Ahmed M., Mahmood A.N., Islam M.R. A survey of anomaly detection techniques in financial domain. Future Gener. Comput. Syst. 2016; 55: 278-288. https://doi.org/10.1016/j.future.2015.01.001
Karcan R.V., Karcan I.N. Daktiloskopiya biometricheskij metod identifikacii na rezhimnom predpriyatii. Aktual'nye problemy aviacii i kosmonavtiki. 2013; 1(9): 405-406. (in Russian).
Mishra P., Pilli E.S., Varadharajan V., Tupakula U. Intrusion detection techniques in cloud environment: A survey. J. Netw. Comput. Appl. 2017; 77: 18-47. https://doi.org/10.1016/j.jnca.2016.10.015 DOI: https://doi.org/10.1016/j.jnca.2016.10.015
Chang D., Ghosh M., Sanadhya S.K., Singh M., White D.R. FbHash: A new similarity hashing scheme for digital forensics. Digit. Invest. 2019; 29: S113-S123. https://doi.org/10.1016/j.diin.2019.04.006 DOI: https://doi.org/10.1016/j.diin.2019.04.006
Ahmed M., Mahmood A.N., Islam M.R. A survey of anomaly detection techniques in financial domain. Future Gener. Comput. Syst. 2016; 55: 278-288. https://doi.org/10.1016/j.future.2015.01.001 DOI: https://doi.org/10.1016/j.future.2015.01.001
Suhostat V.V. Teoriya informacionnoj bezopasnosti i metodologiya zashchity informacii. SPb: Universitet ITMO; 2018. (in Russian).
Downloads
Published
How to Cite
Conference Proceedings Volume
Section
License
Copyright (c) 2023 I. N. Kartsan
This work is licensed under a Creative Commons Attribution 4.0 International License.
The journal MIST - "Modern Innovations, Systems and Technologies" publishes materials under the terms of the Creative Commons Attribution 4.0 International (CC BY 4.0) license, hosted on the official website of the non-profit corporation Creative Commons:
This work is licensed under a Creative Commons Attribution 4.0 International License.
This means that users can copy and distribute materials in any medium and in any format, adapt and transform texts, use content for any purpose, including commercial ones. At the same time, the terms of use must be observed - an indication of the author of the original work and the source: you should indicate the output of the articles, provide a link to the source, and also indicate what changes have been made