Biometric data: new opportunities and risks

Authors

DOI:

https://doi.org/10.47813/2782-2818-2023-3-3-0201-0211

Keywords:

biometric data, personal data protection, risks, opportunities, protection methods, multifactor authentication, falsification, leakage, usage control, personal information.

Abstract

The issues of personal data protection when using biometric technologies are considered, since regardless of whether a fingertip, face or iris is scanned, the information collected is personal information about the identified person. New possibilities of biometrics and its application in different spheres of life such as finance, medicine, security, etc. are analyzed. The most common example of biometrics is the photograph used in a passport, driver's license or medical card. Simply put, an image of a person's face is captured and stored in order to later compare it to another photo or to a living person. The article also covers the risks associated with the use of biometric data, such as the possibility of leakage, falsification and misuse not only in a centralized mechanism of access to various facilities, but also at each individual access point. Methods for protecting biometric data such as encryption and the use of multi-factor or two-factor authentication are presented. Recommendations are given for protecting personal information and controlling its use when deploying any technology or service that utilizes biometrics.

Author Biography

I. N. Kartsan

Igor Kartsan, Dr. Sc., Docent, Leading Researcher, Marine Hydrophysical Institute, Russian Academy of Sciences, Sevastopol, Russia

References

Kshetri N. Blockchain’s roles in meeting key supply chain management objectives. Int. J. of Inf. Management. 2018; 39: 80-89. https://doi.org/10.1016/j.ijinfomgt.2017.12.005

Huseyin G.T. Gurkan I. Facet-to-facet grouping: A clustering approach to enrich blockchain-based group operations. Inf. Sciences. 2020; 522: 99-125.

Borek A., Tiwari A. Smart contracts as instruments for business process management. Inf. Systems Frontiers. 2018; 20: 1-17.

Eisenhardt K.M., Graebner M.E. Theory building from cases: Opportunities and challenges. Academy of Management Journal. 2007; 50(1): 25-32. https://doi.org/10.5465/amj.2007.24160888

Аверьянов В.С., Карцан И.Н. Методы оценки защищенности автоматизированных систем на базе квантовых технологий согласно CVSSV2.0/V3.1. Защита информации. Инсайд. 2023; 1(109): 18-23.

Карцан И.Н., Жуков А.О. Механизм защиты промышленной сети. Информационные и телекоммуникационные технологии. 2021; 52: 19-26.

Аверьянов В.С., Карцан И.Н. Безопасность ключевой последовательности по протоколу Чарльза Беннета. В сборнике: Российская наука, инновации, образование - РОСНИО-2022. 2022; 72-75.

Flint D. Strategic marketing in global supply chains: Four challenges. Industrial Marketing Management. 2004; 33: 45–50. https://doi.org/10.1016/j.indmarman.2003.08.009

Карцан И.Н., Контылева Е.А. Глубокий интернет вещей. Современные инновации, системы и технологии - Modern Innovations, Systems and Technologies. 2023; 3(2): 0201–0212. https://doi.org/10.47813/2782-2818-2023-3-2-0201-0212

Жуков А.О., Карцан И.Н., Аверьянов В.С. Кибербезопасность Арктической зоны. Информационные и телекоммуникационные технологии. 2021; 51: 9-13.

Goldbach M., Seuring S., Back S. Coordinating sustainable cotton chains for the mass market –The case of the German mail order business OTT. Greener Management International. 2003; 43; 65–78. https://doi.org/10.9774/GLEAF.3062.2003.au.00008

Golder P.N. Historical method in marketing research with new evidence on long-term market share stability. Journal of Marketing Research. 2000; 37(2): 156–172. https://doi.org/10.1509/jmkr.37.2.156.18732

Ahmed M., Mahmood A.N., Islam M.R. A survey of anomaly detection techniques in financial domain. Future Gener. Comput. Syst. 2016; 55: 278-288. https://doi.org/10.1016/j.future.2015.01.001

Карцан Р.В., Карцан И.Н. Дактилоскопия биометрический метод идентификации на режимном предприятии. Актуальные проблемы авиации и космонавтики. 2013; 1(9): 405-406.

Mishra P., Pilli E.S., Varadharajan V., Tupakula U. Intrusion detection techniques in cloud environment: A survey. J. Netw. Comput. Appl. 2017; 77: 18-47. https://doi.org/10.1016/j.jnca.2016.10.015

Chang D., Ghosh M., Sanadhya S.K., Singh M., White D.R. FbHash: A new similarity hashing scheme for digital forensics. Digit. Invest. 2019; 29: S113-S123. https://doi.org/10.1016/j.diin.2019.04.006

Ahmed M., Mahmood A.N., Islam M.R. A survey of anomaly detection techniques in financial domain. Future Gener. Comput. Syst. 2016; 55: 278-288. https://doi.org/10.1016/j.future.2015.01.001

Сухостат В.В. Теория информационной безопасности и методология защиты информации. СПб: Университет ИТМО; 2018.

REFERENCES

Kshetri N. Blockchain’s roles in meeting key supply chain management objectives. Int. J. of Inf. Management. 2018; 39: 80-89. https://doi.org/10.1016/j.ijinfomgt.2017.12.005 DOI: https://doi.org/10.1016/j.ijinfomgt.2017.12.005

Huseyin G.T. Gurkan I. Facet-to-facet grouping: A clustering approach to enrich blockchain-based group operations. Inf. Sciences. 2020; 522: 99-125.

Borek A., Tiwari A. Smart contracts as instruments for business process management. Inf. Systems Frontiers. 2018; 20: 1-17.

Eisenhardt K.M., Graebner M.E. Theory building from cases: Opportunities and challenges. Academy of Management Journal. 2007; 50(1): 25–32. https://doi.org/10.5465/amj.2007.24160888 DOI: https://doi.org/10.5465/amj.2007.24160888

Aver'yanov V.S., Karcan I.N. Metody ocenki zashchishchennosti avtomatizirovannyh sistem na baze kvantovyh tekhnologij soglasno CVSSV2.0/V3.1. Zashchita informacii. Insajd. 2023; 1(109): 18-23. (in Russian).

Karcan I.N., Zhukov A.O. Mekhanizm zashchity promyshlennoj seti. Informacionnye i telekommunikacionnye tekhnologii. 2021; 52: 19-26. (in Russian).

Aver'yanov V.S., Karcan I.N. Bezopasnost' klyuchevoj posledovatel'nosti po protokolu CHarl'za Benneta. V sbornike: Rossijskaya nauka, innovacii, obrazovanie - ROSNIO-2022. 2022; 72-75. (in Russian).

Flint D. Strategic marketing in global supply chains: Four challenges. Industrial Marketing Management. 2004; 33: 45–50. https://doi.org/10.1016/j.indmarman.2003.08.009 DOI: https://doi.org/10.1016/j.indmarman.2003.08.009

Karcan I.N., Kontyleva E.A. Glubokij internet veshchej. Sovremennye innovacii, sistemy i tekhnologii - Modern Innovations, Systems and Technologies. 2023; 3(2): 0201–0212. https://doi.org/10.47813/2782-2818-2023-3-2-0201-0212 (in Russian). DOI: https://doi.org/10.47813/2782-2818-2023-3-2-0201-0212

Zhukov A.O., Karcan I.N., Aver'yanov V.S. Kiberbezopasnost' Arkticheskoj zony. Informacionnye i telekommunikacionnye tekhnologii. 2021; 51: 9-13. (in Russian).

Goldbach M., Seuring S., Back S. Coordinating sustainable cotton chains for the mass market –The case of the German mail order business OTT. Greener Management International. 2003; 43; 65–78. https://doi.org/10.9774/GLEAF.3062.2003.au.00008 DOI: https://doi.org/10.9774/GLEAF.3062.2003.au.00008

Golder P.N. Historical method in marketing research with new evidence on long-term market share stability. Journal of Marketing Research. 2000; 37(2): 156–172. https://doi.org/10.1509/jmkr.37.2.156.18732 DOI: https://doi.org/10.1509/jmkr.37.2.156.18732

Ahmed M., Mahmood A.N., Islam M.R. A survey of anomaly detection techniques in financial domain. Future Gener. Comput. Syst. 2016; 55: 278-288. https://doi.org/10.1016/j.future.2015.01.001

Karcan R.V., Karcan I.N. Daktiloskopiya biometricheskij metod identifikacii na rezhimnom predpriyatii. Aktual'nye problemy aviacii i kosmonavtiki. 2013; 1(9): 405-406. (in Russian).

Mishra P., Pilli E.S., Varadharajan V., Tupakula U. Intrusion detection techniques in cloud environment: A survey. J. Netw. Comput. Appl. 2017; 77: 18-47. https://doi.org/10.1016/j.jnca.2016.10.015 DOI: https://doi.org/10.1016/j.jnca.2016.10.015

Chang D., Ghosh M., Sanadhya S.K., Singh M., White D.R. FbHash: A new similarity hashing scheme for digital forensics. Digit. Invest. 2019; 29: S113-S123. https://doi.org/10.1016/j.diin.2019.04.006 DOI: https://doi.org/10.1016/j.diin.2019.04.006

Ahmed M., Mahmood A.N., Islam M.R. A survey of anomaly detection techniques in financial domain. Future Gener. Comput. Syst. 2016; 55: 278-288. https://doi.org/10.1016/j.future.2015.01.001 DOI: https://doi.org/10.1016/j.future.2015.01.001

Suhostat V.V. Teoriya informacionnoj bezopasnosti i metodologiya zashchity informacii. SPb: Universitet ITMO; 2018. (in Russian).

Published

2023-07-18

How to Cite

Kartsan, I. N. (2023). Biometric data: new opportunities and risks . Modern Innovations, Systems and Technologies, 3(3), 0201–0211. https://doi.org/10.47813/2782-2818-2023-3-3-0201-0211

Conference Proceedings Volume

Section

IT and informatics