Figure 5: Finger print data capture & storage.
3. Secure Transfer & Hashing:
a. Fingerprint data logs were retrieved from an
Android device using ADB and stored on a
Kali Linux system.
b. adb pull /sdcard/fingerprint_log.txt. This will
save fingerprint_log.txt in your current Kali
directory.the figure 3 illustrated theSecure
Biometric Data Management with Blockchan.
c. To ensure data integrity, a SHA-256 hash of
the fingerprint log file was generated and
stored securely. the Figure4 illustrated the
Connect & Test Fingerprint Scanner.
sha256sum fingerprint_log.txt > fingerprint
_hash.txt
d. Verify it’s there: ls -lh fingerprint_log.txt
4. Decentralized Storage on IPFS:
a. The fingerprint hash was uploaded to IPFS,
providing a decentralized, immutable, and
tamper-proof storage mechanism. the figure 6
Illustrated the Secure Transfer & Hashing.
b. The stored hash can be retrieved later using the
CID (Content Identifier) for verification,
ensuring data authenticity.
Figure 6: Secure transfer & hashing.
7 CONCLUSION
The proposed biometric authentication system
enhances security by integrating post-quantum
cryptographic algorithms with blockchain-based
storage. By eliminating centralized vulnerabilities
and ensuring data integrity, our approach aligns with
SDG 9 (Industry, Innovation, and Infrastructure),
SDG 16 (Peace, Justice, and Strong Institutions), and
SDG 11 (Sustainable Cities and Communities). These
goals contribute to the development of resilient digital
infrastructure, safeguarding personal data, and
creating a more secure digital society. Future research
will explore optimizing performance metrics and
real-world deployment.
REFERENCES
A. K. Das, P. Sharma, S. Chatterjee, and M. Conti, "A
Dynamic Password-Based User Authentication Scheme
for Hierarchical Wireless Sensor Networks," Journal of
Network and Computer Applications, vol. 35, no. 5, pp.
1646–1656, 2012.
A.Shamir, "Identity-Based Cryptosystems and Signature
Schemes," in Advances in Cryptology, G. R. Blakley
and D. Chaum, Eds. Boston, MA: Springer US, 1985,
pp. 47–53.
Attila A. Yavuz, Saleh Darzi, and Saif E. Nouma,
"LiteQSign: Lightweight and Scalable Post-Quantum
Authentication for Heterogeneous IoT Applications,"
arXiv preprint arXiv:2311.18674, March 2025.
C. P. Schnorr, "Efficient Signature Generation by Smart
Cards," Journal of Cryptology, vol. 4, no. 3, pp. 161–
174, 1991.
D. Chaum and E. van Heyst, "Group Signatures," in
Advances in Cryptology EUROCRYPT '91, D. W.
Davies, Ed. Berlin, Heidelberg: Springer-Verlag, 1991,
pp. 257–265.
D.Boneh and M. Franklin, "Identity-Based Encryption from
the Weil Pairing," in Advances in Cryptology CRYPTO
2001, J. Kilian, Ed. Berlin, Heidelberg: Springer-
Verlag, 2001, pp. 213–229.
J. Liu, Z. Chen, and F. Xiao, "A Survey on Blockchain-
Based Identity Management Systems," Frontiers of
Computer Science, vol. 15, no. 1, pp. 1–17, 2021.
J.Camenisch and A. Lysyanskaya, "An Efficient System for
Non-transferable Anonymous Credentials with
Optional Anonymity Revocation," in Advances in
Cryptology EUROCRYPT 2001, B. Pfitzmann, Ed.
Berlin, Heidelberg: Springer-Verlag, 2001, pp. 93–118.
K. R. Raghavendra and S. B. D. Kumar, "A Secure and
Efficient Biometric Authentication Scheme for
Multiserver Environments Using Elliptic
Curve Cryptography," Security andCommunication
Networks, vol. 2018, Article ID 4241520, 2018.
L. Lamport, "Password Authentication with Insecure
Communication," Communications of the ACM, vol.
24, no. 11, pp. 770–772, 1981.
M. Bellare and P. Rogaway, "Random Oracles are
Practical: A Paradigm for Designing Efficient
Protocols," in Proceedings of the 1st ACM Conference
on Computer and Communications Security, Fairfax,
Virginia, USA, 1993, pp. 62–73.
M. Conti, S. Kumar, C. Lal, and S. Ruj, "A Survey on
Security and Privacy Issues of Bitcoin," IEEE
Communications Surveys & Tutorials, vol. 20, no. 4,
pp. 3416–3452, 2018.
N. Kaaniche and M. Laurent, "A Blockchain-Based Data
Usage Auditing Architecture with Enhanced Privacy