DOI QR코드

DOI QR Code

Implementing Onetime Password based Access Control System for Secure Sharing Service

  • Kang, Namhi (Department of Cybersecurity, Duksung Women's University)
  • Received : 2021.05.10
  • Accepted : 2021.05.16
  • Published : 2021.08.31

Abstract

Development of ICT technologies leads exponential growth of various sharing economy over the last couple of years. The intuitive advantage of the sharing economy is efficient utilization of idle goods and services, but there are safety and security concerns. In this paper, we propose a onetime password based access control system to support secure accommodation sharing service and show the implementation results. To provide a secure service to both the provider and the user, the proposed system issues a onetime access password that is valid only during the sharing period reserved by the user, thereafter access returns to the accommodation owner. Especially, our system provides secure user access by merging the two elements of speaker recognition using voice and a one-time password to open and close the door lock. In this paper, we propose a secure system for accommodation sharing services as a use-case, but the proposed system can be applicable to various sharing services utilizing security-sensitive facilities.

Keywords

Acknowledgement

This Research was supported by Duksung Women's University Research Grants 2020.

References

  1. Yun Seung Ko, "A Study on Sharing Economy of the ICT development," The e-Business Studies, Vol. 15, No. 6, pp 77-100, DEC. 2014. DOI: http://dx.doi.org/10.15719/geba.15.6.201412.77
  2. Daniel Schlagwein, Detlef Schoder, and Kai Spindeldreher, "Consolidated, systemic conceptualization, and definition of the sharing economy," Journal of the Association for Information Science and Technology, Vol. 71, No. 7, pp. 817-838, OCT. 2019. DOI: https://doi.org/10.1002/asi.24300
  3. Xiao Shuyang. "Research on the information security of sharing economy customers based on block chain technology," Information Systems and e-Business Management, Springer, Vol. 18, pp. 487-496, Dec. 2018. DOI: https://doi.org/10.1007/s10257-018-0380-4
  4. Lim Eunjung, Shindo Mari, and Arita Shin, "A Korean-Japanese Comparison Research on Social Discussions about Accommodation Sharing Service: Using Network Text Analysis on Korean-Japanese Articles," Journal of consumer policy studies, Vol. 51, No. 1, pp. 1-34, APR. 2020. DOI: http://dx.doi.org/10.15723/jcps.51.1.202004.1
  5. I-Deun Cho, Soo-Jin Park, and Namhi Kang, "Hacking Attacks and Countermeasures using Vulnerabilities of Lightweight IP Camera in Internet of Things," Journal of Digital Contents Society, Vol. 20, No. 5, pp. 1069-1077, May 2019. DOI: http://dx.doi.org/10.9728/dcs.2019.20.5.1069
  6. Jeongin Kim and Namhi Kang, "Secure Configuration Scheme for Internet of Things using NFC as OOB Channel," The Journal of the Institute of Internet, Broadcasting and Communication, Vol. 16, No. 3, pp.13-19, May. 2016. DOI: https://doi.org/10.7236/JIIBC.2016.16.3.13
  7. Gorog, Georgina, "The Definitions of Sharing Economy: A Systematic Literature Review," Management (18544223), Vol. 13, No. 2, JUN. 2018. DOI: https://doi.org/10.26493/1854-4231.13.175-189
  8. Song Woon-Gang and Park Yongsook, "Study on the Regulations of Sharing Economy," KANGWON LAW REVIEW, Vo. 55, pp. 353-401, OCT. 2018. DOI: https://doi.org/10.18215/kwlr.2018.55..353
  9. Ray Partha Pratim. "A survey on Internet of Things architectures." Journal of King Saud University-Computer and Information Sciences, Vol. 30. No. 3, pp. 291-319. 2018. DOI: https://doi.org/10.4108/eai.1-12-2016.151714
  10. J Park, H Kwon and N Kang, "IoT-cloud collaboration to establish a secure connection for lightweight devices," Wireless Networks 23 (3), pp. 681-692, Springer, 2017.04. DOI: https://doi.org/10.1007/s11276-015-1182-y
  11. Yoon Sung Hoon, Lee Kil Soo, Mariappan Vinayagam, Young Ko Eun, and Woo Deok Gun and Kim Jeong Uk, "IoT Open-Source and AI based Automatic Door Lock Access Control Solution," The Journal of The Institute of Internet, Broadcasting and Communication(JIIBC), Vol. 12, No. 2, pp. 8-14 Apr 2020. DOI: http://dx.doi.org/ 10.7236/IJIBC.2020.12.2.8
  12. Pradnya R. Nehete, J. Chaudhari and K. Rane, "Literature survey on door lock security systems," International Journal of Computer Applications, Vol. 153, No. 2, pp. 13-18, 2016. DOI: http:/10.5120/ijca2016911971
  13. International Organization for Standardization, Gen'eve, Switzerland. "ISO/IEC 9798-1:2010, Information technology - Security techniques - Entity Authentication - Part 1: General," Third edition, 2010. DOI: https://doi.org/10.3403/00278828u
  14. Jieun Eom, Minhye Seo, Jong Hwan Park and Dong Hoon Lee, "Efficient ID-Based Authentication and Key Exchange Protocol," Journal of the Korea Institute of Information Security and Cryptology, Vol. 26 Iss. 6, pp. 1387- 1399, Dec 2016. DOI: https://doi.org/10.13089/jkiisc.2016.26.6.1387
  15. So-Yeon Min and Jae-Seung Lee, "Device Mutual Authentication and Key Management Techniques in a Smart Home Environment," Journal of Korea Academy Industrial Cooperation Society, Vol. 19, No. 10, pp. 661-667, OCT. 2018. DOI: https://doi.org/10.5762/KAIS.2018.19.10.661