Running Head: PROSPECTUS 1

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 7

Running head: PROSPECTUS 1

Improvising Biometric and Biometric Data Using Combination of Behaviour Identifier and

Use of Block Chain Systems to Securing Information in Healthcare Units

Prospectus

Name

Institution Affiliation
PROSPECTUS 2

Background and Significance

Biometric is the use of distinctive biological or behaviour characteristics to identify

people. Biometric data is a general term used to refer to any computer data that is created

during a biometric process[ CITATION Ted09 \l 2057 ]. Automated biometric recognition

mimics, through a combination of hardware and pattern recognitions algorithms, a

fundamental human attribute to distinguish and recognize other people as individual and

unique. The main objectives of biometric systems is the recognition or authentication of

individuals based on some physical or behavioural characteristics that are intrinsically unique

for each individual[ CITATION Nik10 \l 2057 ]. Examples of these biometric identifiers are facial

patterns, fingerprints, typing cadence or voice. Each of these identifiers is considered unique

to the individual, and they may be used in combinations to ensure greater accuracy of

identification.

The applications of biometrics ranges from access control, military and surveillance to

banks and multimedia copyright protection. The first time you use the biometric system, it

collects basic information about you[ CITATION Rob101 \l 2057 ]. It then captures by taking a

picture or recording of your particular characteristic by recording it. It then stages to storing,

Contrary to what you can see in films, most applications do not store the entire image or

video. Instead, they analyze and translate your trait into a code or a graph. Some systems also

store this data on a smart card with you. The next time you use the system it compares the

function you present to the file data the next time you use the program. Then it either accepts

or denies what you want to be who you are[ CITATION Joh07 \l 2057 ]. The system also uses

three components;

 A sensor that has the purpose of detecting the characteristic being applied or used for

identification

 A computer that is responsible for acquiring, interpreting and storing the information
PROSPECTUS 3

 Software that is used to analyze the characteristic, translating it into interpretable

presentations inform of codes or graph and performing the actual comparison

The diagram illustrates the basic modes of a biometric system

Figure 1: The basic biometric System for an information entry.

Summary and Hypotheses

The main goal of this Thesis will be to provide an improvised biometric data system

that is more durable and prone to data breaching in healthcare facilities, (using behaviour

identifier) in order to reach an absolute security of data for health facilities and other related

organisations. Essentially, the biometric gadget on this thesis is suited to record on

engagement combination of patterns that include the mouth lips while talking, mouth and

teeth structure, tongue shape and the size and shape of the mouth (Mouth identifier). Despite

the recent report of data bleaching where by researchers managed to access gigabyte of

database of millions of people, applying the use of behaviour identity like physical patterns,

navigation patters, physical movements and engagement patterns would best suit to curb such

cases of theft.

The proposed improvised biometric will provide sustainability and a fast access to

information in hospitals and other health facilities to patients whose health data are
PROSPECTUS 4

electronically stored. To make the four features as of the mouth identifier stronger, first is

applying a one simple way password. Storing passwords by first encrypting them and

"hashing" them is a common practice. This is basically a one-way authentication variant

which turns passwords into a string of characters known as a message digest which

decryption is nearly impossible. It means that attackers/hackers can't get the passwords even

if the coded keys were released. With their original plain text format, modern systems would

never store passwords. In the recent biometric database breach, the data was stored in raw

format without authentication. This means that hackers can directly access and duplicate

users ' raw biometric features for critical services.

The other combination would be use of block chain, the system behind

cryptocurrencies like Bitcoin, which would be another way to make biometric systems more

secure[ CITATION Emm18 \l 2057 ]. With blockchain technology, you can store customer data in

multiple computers around the world in a distributed ledger that is protected by cryptography.

It ensures that only the data (or data blocks) can be accessed by licensed parties and any

attempt to change the information will be identified by any other user subscribing to the

blockchain[ CITATION Jav19 \l 2057 ]. It is also possible to create shared private ledgers that can

only be viewed by some individuals.

Methods

Experiments:

The experiment will assess the use of behaviour identifier that is designed to capture

on the speed of talking, mouth and teeth structure, tongue shape and the size and shape of the

mouth and after capturing the data, technologies it by building and attaching it to blockchain.

This process is chosen due to its higher efficiency capturing and storing. The assessment will

involve healthcare fraternities like hospital, with participants who will carry out the tests to
PROSPECTUS 5

find the result of the improvisation. Three tests will be carried on that will distinguish how

secure the platform is over the other. The first test will be using the usual biometrics

securities entries; the physical identifier that includes facial patterns, voice or typing cadence,

and finger print. The second test will include usual behavioural biometrics that include

keystroke dynamics, gait analysis, mouse use characteristics and cognitive biometrics. The

third and the final will text concerning the biometric with a combination of behavioural and

block chain system. All these tests will go through scanning to prove their efficiency.

Participants:

To test on the efficiency of the improvisation, it will sample willing participants who

have health statistics, and their records will be re-administered afresh, so that they can meet

the expectance of the behaviour identifiers of the mouth scan. The patients will be guided

through a process of their behaviour change in regard to their mouth. After capturing the data,

it will be taken through a process of storage and the patient will provide a password to the

records, then the data will be encrypted and hashed them is a common practice. In this case,

letter y will be choosing to represent the name of the patient.

Procedure:

In order to determine the operation degree to which the information or data of patient

is secure, and the platform cannot be easily breached, two processes must be undergone.

First, the patient data is be acquired, and entered in to the new system for application

assessment. Second, the patient is to pass through scanning process. After the scanning, the

information acquired will be used as the entry login password to retrieve the data to the

patient portal.

The results obtained from the three tests will be used to evaluate the durability and

flexibility levels of the usual and the improvised biometrics, and determine the best efficiency
PROSPECTUS 6

of the improvised biometric. Measuring if it meets the standards needed for security of the

information storage.

Results:

The results of the experiment could indicate three possible results. Results one to the

first test could indicate that after scanning the patient and applying the physical identifiers,

the biometric was easily prone to threats and wasn’t strong to resist appliance of strong

hacking threats. The second test on the physical and behavioural identifiers would display

slight strength to resistance against threats, though after appliance of strongest threats the

biometric will be breached. The third test, combination of behavioural and use of block chain

systems would show how strong the biometric is strong against hacking and any other mode

of threat to data breaching.


PROSPECTUS 7

Boulgouris, N. V., Plataniotis, K. N., & Micheli-Tzanakou, E. (2010). Biometrics : theory,

methods, and applications. Piscataway, N.J: IEEE Press ; Hoboken, N.J. : Wiley.

Dunstone, T., & Yager, N. (2009). Biometric system and data analysis : design, evaluation,

and data mining. New York: Springer.

Ganne, E., & World Trade Organization. (2018). Can blockchain revolutionize international

trade? Geneva : World Trade Organization.

Newman, R. (2010). Security and access control using biometric technologies. Boston, Mass:

Course Technology.

Prieto, J., Das, A. K., Ferretti, S., Pinto, A., & Corchado, J. M. (2019). Blockchain and

applications : international congress. Cham, Switzerland: Springer.

Vacca, J. R. (2007). Biometric technologies and verification systems. Amsterdam ; Boston:

Butterworth-Heinemann/Elsevier.

You might also like