To see the other types of publications on this topic, follow the link: Blockchain Identity Management.

Journal articles on the topic 'Blockchain Identity Management'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Blockchain Identity Management.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Yadav, Susheel. "Decentralizing Identity with Blockchain Technology in Digital Identity Management." Journal of Current Research in Blockchain 1, no. 3 (2024): 178–89. https://doi.org/10.47738/jcrb.v1i3.22.

Full text
Abstract:
Blockchain technology has emerged as a promising solution for digital identity verification, offering significant improvements in security, decentralization, and privacy. This study examines the application of blockchain in identity systems, focusing on the benefits and challenges it presents. The findings reveal that blockchain enhances security by 85%, decentralizes data control by 80%, and improves privacy protection by 75% compared to traditional centralized systems. Additionally, the study highlights key challenges, including regulatory uncertainty, scalability issues, and interoperabilit
APA, Harvard, Vancouver, ISO, and other styles
2

Kyaw, Soe Moe, and Mya Thwe Mya. "Investigation of Blockchain Based Identity System for Privacy Preserving University Identity Management System." International Journal of Trend in Scientific Research and Development 3, no. 6 (2019): 336–41. https://doi.org/10.5281/zenodo.3587851.

Full text
Abstract:
Existing blockchain based identity systems are analyzed under the context of the university identity management requirements. The private or consortium blockchain is more suitable for identity system which will be used for university. The transparency of public blockchains raises some concerns for privacy and confidentiality. The most important issue is that the volume of the data generated can be very large exceeding the practical storage capabilities of the current blockchain usages. The existing identity systems are not well fixed with the university identity management system really needs,
APA, Harvard, Vancouver, ISO, and other styles
3

Gujar, Vivek. "Identity Management, SSI and Blockchain: A Review." International Journal of Science and Research (IJSR) 13, no. 1 (2024): 1547–53. http://dx.doi.org/10.21275/sr24123105221.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ranga, Premsai. "Blockchain Technology in Identity Management: Enhancing Cybersecurity Frameworks." International Journal of Innovative Research in Engineering & Multidisciplinary Physical Sciences 11, no. 6 (2023): 1–16. https://doi.org/10.5281/zenodo.14280061.

Full text
Abstract:
Identity management is a critical component of cybersecurity, ensuring that only authorized individuals can access sensitive systems and data. Traditional identity management systems, which rely on centralized databases, face growing challenges related to data breaches, unauthorized access, and identity theft. Blockchain technology, with its decentralized, transparent, and tamper-resistant nature, has emerged as a promising solution to enhance identity management frameworks and improve overall cybersecurity.This paper proposes a novel identity management framework leveraging blockchain technol
APA, Harvard, Vancouver, ISO, and other styles
5

*, *. "BLOCKCHAIN BASED DIGITAL IDENTITY MANAGEMENT." Euroasia Journal of Mathematics, Engineering, Natural and Medical Sciences 7, no. 8 (2020): 202–9. http://dx.doi.org/10.38065/euroasiaorg.35.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Singla, Ashish, Nakul Gupta, Prageet Aeron, Anshul Jain, Divya Sharma, and Sangeeta Shah Bharadwaj. "Decentralized Identity Management Using Blockchain." Journal of Global Information Management 31, no. 2 (2022): 1–24. http://dx.doi.org/10.4018/jgim.315283.

Full text
Abstract:
This article explores the usage of decentralised identity (DID) management using blockchain in global organisations to support secure usage of information resources. Blockchain as technology was initially introduced as a cryptocurrency and there have been challenges in its adoption for enterprise applications such as identity management. DID is emerging as one of the strong blockchain adoption use cases. Industry pioneers and users across domains have started exploring DID use cases, which help better protect their personal data and application access control as compared to traditional, centra
APA, Harvard, Vancouver, ISO, and other styles
7

Gobika S. and Vaishnavi N. M.Sc., M.Phil., (Ph.D.). "Blockchain Based Identity Management System." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 2 (2025): 1413–20. https://doi.org/10.32628/cseit25112471.

Full text
Abstract:
Traditional identity management systems often suffer from security vulnerabilities, data breaches, and inefficiencies due to centralized control. Blockchain technology offers a decentralized and tamper-resistant alternative for identity management, enhancing security, privacy, and user control. This paper explores a blockchain-based identity management system that leverages decentralized identifiers (DIDs) and verifiable credentials to provide a secure, transparent, and user-centric identity framework. The proposed system ensures data integrity, minimizes identity fraud, and enables seamless a
APA, Harvard, Vancouver, ISO, and other styles
8

Brindha, S. Former Assistant Professor of Business Administration, and R. D. Assistant Professor Department of Computer Science Sivakumar. "BLOCKCHAIN-BASED IDENTITY MANAGEMENT IN FINANCIAL SERVICES." Indian Journal of Research and Development Systems in Technologization 1, no. 1 (2024): 44–56. https://doi.org/10.5281/zenodo.10852538.

Full text
Abstract:
<em>The financial services industry in the rapidly changing times has additional needs for strong, cyber secure, and accurate identity management tool. Traditional method approaches usually meet several barriers like privacy issues, data security, and ineffective authentication processes. This paper sets out how blockchain-based solutions can solve these issues and proposes currently a new approach to identity management in the financial sphere. In view of its distributed and unchangeable character, the paper discusses the possible benefits of incorporating blockchain technology into the field
APA, Harvard, Vancouver, ISO, and other styles
9

Herwanto, Riko, Eddy Sumartono, Didit Saputra, Salman Farizy, and Farida Hasanah. "Enhancing Cybersecurity with Blockchain-based Identity Management." Global International Journal of Innovative Research 2, no. 8 (2024): 1951–65. http://dx.doi.org/10.59613/global.v2i8.288.

Full text
Abstract:
In the digital age, the rapid increase in cyber threats has highlighted the need for more robust and secure identity management systems. Traditional centralized identity management systems are often vulnerable to data breaches, unauthorized access, and identity theft, posing significant risks to individuals and organizations. This paper explores the potential of blockchain technology to enhance cybersecurity through decentralized identity management. By leveraging the inherent properties of blockchain—such as immutability, transparency, and decentralization—blockchain-based identity management
APA, Harvard, Vancouver, ISO, and other styles
10

Vasuki, M. "The Impact of Blockchain on Digital Identity Management." International Journal for Research in Applied Science and Engineering Technology 11, no. 7 (2023): 290–94. http://dx.doi.org/10.22214/ijraset.2023.54616.

Full text
Abstract:
Abstract: This journal explores the profound influence of blockchain technology on the realm of digital identity management. As traditional identity systems face significant challenges in terms of security, privacy, and interoperability, blockchain emerges as a promising solution with its decentralized and immutable nature. This paper delves into the key aspects of blockchain technology that contribute to enhancing digital identity management, including decentralization, transparency, security, privacy, and interoperability. The potential benefits and challenges of implementing blockchain-base
APA, Harvard, Vancouver, ISO, and other styles
11

Premsai, Ranga. "IMPLEMENTING IDENTITY AND ACCESS MANAGEMENT FOR IMPROVING CYBER SECURITY." International Scientific Journal of Engineering and Management 03, no. 12 (2024): 1–7. https://doi.org/10.55041/isjem01283.

Full text
Abstract:
Smart Banking Cyber-Physical Systems (SBCPS) face significant risks from various forms of financial fraud, including suspicious transactions, forgery, and identity theft. Traditional fraud detection methods often struggle to provide timely and reliable solutions. To address this, this study proposes an advanced fraud detection system based on a blockchain-enabled smart contract framework, integrating dual cryptographic algorithms: the Secure Asymmetric Hash Encryption Algorithm (SAHEA) and the Triple Integrity Twofish Algorithm (TITFA). The SAHEA ensures secure transaction data encryption usin
APA, Harvard, Vancouver, ISO, and other styles
12

Bamnote, Abhishek, and Rachana Patil. "Identity Management using Blockchain - A Review." International Journal of Darshan Institute on Engineering Research and Emerging Technologies 12, no. 1 (2023): 29–35. http://dx.doi.org/10.32692/ijdi-eret/12.1.2023.2305.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Koa, Chong-Gee, Swee-Huay Heng, and Ji-Jian Chin. "ETHERST: Ethereum-Based Public Key Infrastructure Identity Management with a Reward-and-Punishment Mechanism." Symmetry 13, no. 9 (2021): 1640. http://dx.doi.org/10.3390/sym13091640.

Full text
Abstract:
Public Key Infrastructure (PKI) is the fundamental of secure digital communications. It provides a secure means to authenticate identities over the Internet. Symmetric or asymmetric encryption schemes are widely used in identity authentication in any kind of PKI. The conventional PKI has several drawbacks due to the centralized and non-transparent design. Several recent research works utilize blockchain technology to overcome the limitations of conventional implementations of PKI. Blockchain-based PKI integrates blockchain technology with PKI to form a new type of decentralized PKI (DPKI). Sev
APA, Harvard, Vancouver, ISO, and other styles
14

Partida, Alberto, Regino Criado, and Miguel Romance. "Identity and Access Management Resilience against Intentional Risk for Blockchain-Based IOT Platforms." Electronics 10, no. 4 (2021): 378. http://dx.doi.org/10.3390/electronics10040378.

Full text
Abstract:
Some Internet of Things (IoT) platforms use blockchain to transport data. The value proposition of IoT is the connection to the Internet of a myriad of devices that provide and exchange data to improve people’s lives and add value to industries. The blockchain technology transfers data and value in an immutable and decentralised fashion. Security, composed of both non-intentional and intentional risk management, is a fundamental design requirement for both IoT and blockchain. We study how blockchain answers some of the IoT security requirements with a focus on intentional risk. The review of a
APA, Harvard, Vancouver, ISO, and other styles
15

Mulaji, Sarah S. M., and Sumarie S. Roodt. "The Practicality of Adopting Blockchain-Based Distributed Identity Management in Organisations: A Meta-Synthesis." Security and Communication Networks 2021 (November 28, 2021): 1–19. http://dx.doi.org/10.1155/2021/9910078.

Full text
Abstract:
Blockchain has become an irresistible disruptive technology with the potential to innovate businesses. Ignoring it may in itself result in a competitive disadvantage for organisations. Except for its original financial application of cryptocurrency, more applications are being proposed, the most common being supply chain management and e-voting systems. However, less focus is made on information and cybersecurity applications of blockchain, especially from the enterprise perspective. This paper addresses this knowledge gap by exploring blockchain as a use case for identity management in the co
APA, Harvard, Vancouver, ISO, and other styles
16

Prosper Onagie Yusuf, Abdullahi Mai-Auduga, Samuel Omokhafe Yusuf, Emmanuel Joshua, and Caleb Eshikpemi Yusuf. "A decentralized privacy-preserving and scalable blockchain-based identity management system." International Journal of Science and Research Archive 14, no. 2 (2025): 511–26. https://doi.org/10.30574/ijsra.2025.14.2.0368.

Full text
Abstract:
This project proposes a decentralized Identity Management System (IMS) built on blockchain technology, prioritizing user privacy and security. The system enables individuals to create, manage, and share their digital identities securely, leveraging blockchain’s immutability and transparency. By utilizing smart contracts, the IMS ensures identity verification and authentication while maintaining user control and consent. This innovative approach addresses, current identity management challenges, promoting a secure and decentralized digital identity ecosystem. The project’s outcome has far-reach
APA, Harvard, Vancouver, ISO, and other styles
17

Gujar, Vivek. "IDENTITY MANAGEMENT, SSI AND BLOCKCHAIN: A REVIEW." International Journal of Engineering Applied Sciences and Technology 08, no. 07 (2023): 38–45. http://dx.doi.org/10.33564/ijeast.2023.v08i07.007.

Full text
Abstract:
As an individual, in the social and digital world, the burden of managing multiple online IDs and passwords, while handling a host of documents e.g passports, driver’s licenses, Social Security/Aadhar cards and medical insurance cards is cumbersome. Identities both in the social and digital world requires security and privacy: managing these identities efficiently is called Identity Management. Once these identities established, they are produced, shown, send, verified in some way or the other for various processes in Government and non Government purposes. Lately it is established that Blockc
APA, Harvard, Vancouver, ISO, and other styles
18

Shetye, Gauri, Nandini Sonar, and Dr Dhanamma Jagli. "Blockchain-based Self-sovereign Identity Management System." International Journal for Research in Applied Science and Engineering Technology 10, no. 6 (2022): 2128–31. http://dx.doi.org/10.22214/ijraset.2022.44335.

Full text
Abstract:
Abstract - The whole concept of self-sovereign identity (SSI) is gaining a lot of optimism, with the emerging Blockchain Technology in the current tech-scenario. It is a major change in how online interactions will take place in the future considering the identity of each user. The different aspects of SSI are examined by various works in the literature This paper surveys the origin of identity, various digital identity models and how it leads to self-sovereign identity. It then goes on to discuss related research, as well as the SSI's building blocks, which include decentralized IDs, verifiab
APA, Harvard, Vancouver, ISO, and other styles
19

Venkatraman, Sitalakshmi, and Sazia Parvin. "Developing an IoT Identity Management System Using Blockchain." Systems 10, no. 2 (2022): 39. http://dx.doi.org/10.3390/systems10020039.

Full text
Abstract:
Identity (ID) management systems have evolved based on traditional data modelling and authentication protocols that are facing security, privacy, and trust challenges with the growth of Internet of Things (IoT). Research surveys reveal that blockchain technology offers special features of self-sovereign identity and cryptography that can be leveraged to address the issues of security breach and privacy leaks prevalent in existing ID management systems. Although research studies are recently exploring the suitability of blockchain based support to existing infrastructure, there is a lack of foc
APA, Harvard, Vancouver, ISO, and other styles
20

Gahlawat, Monica. "Survey of Online Identity Management Techniques on Blockchain." International Journal of Security and Privacy in Pervasive Computing 12, no. 4 (2020): 19–28. http://dx.doi.org/10.4018/ijsppc.2020100102.

Full text
Abstract:
Secure identity management is one of the controversial topics in the cybersecurity landscape. The user needs to rely on third-party providers for managing their personal information, which is a big security concern. Traditional identity systems typically suffer from single points of failure, lack of interoperability, and privacy issues such as encouraging mass data collection and user tracking. Blockchain technology has the potential to support novel data ownership and governance models with built-in control and consent mechanisms, which may benefit both users and businesses by alleviating the
APA, Harvard, Vancouver, ISO, and other styles
21

Ra, Gyeongjin, Deahee Seo, Md Zakirul Alam Bhuiyan, and Imyeong Lee. "An Anonymous Protocol with User Identification and Linking Capabilities for User Privacy in a Permissioned Blockchain." Electronics 9, no. 8 (2020): 1183. http://dx.doi.org/10.3390/electronics9081183.

Full text
Abstract:
A permissioned blockchain includes a user in the network after verifying the user’s identity, in contrast to Bitcoin, which is a public blockchain that allows network participation without third-party approval. The two types of permissioned blockchains are private blockchains, each consisting of one server and multiple users, and consortium blockchains, which consist of groups of private blockchains. However, a blockchain has privacy issues, such as user tracking and inference. Therefore, cryptography should be applied for user privacy in a blockchain. There is a lot of research on anonymous p
APA, Harvard, Vancouver, ISO, and other styles
22

Gandhi, Mardavkumar. "Survey on Identity Management using Blockchain Technology." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 12 (2018): 52. http://dx.doi.org/10.23956/ijarcsse.v7i12.506.

Full text
Abstract:
In the present interconnected world, digital IDs are used to demonstrate identity. These IDs prove to be only tangentially related to the service being accessed and requires us to apply a significant amount of privacy. The current systems possess number of problems such as proxies but blockchain proves to be the solution for this type of Identity related problem.Markers of identity are often required to be very personal pieces of data. Consider a list of personal information collected when someone opens a savings account, such as address and identification (driver’s license or passport). It’s
APA, Harvard, Vancouver, ISO, and other styles
23

Liu, Yang, Debiao He, Mohammad S. Obaidat, Neeraj Kumar, Muhammad Khurram Khan, and Kim-Kwang Raymond Choo. "Blockchain-based identity management systems: A review." Journal of Network and Computer Applications 166 (September 2020): 102731. http://dx.doi.org/10.1016/j.jnca.2020.102731.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Lee, Wookun, Jae-Hwan Jin, and Myung-Joon Lee. "A Blockchain-based Identity Management Service Supporting Robust Identity Recovery." International Journal of Security Technology for Smart Device 4, no. 1 (2017): 29–34. http://dx.doi.org/10.21742/ijstsd.2017.4.1.04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Nikhil Ghadge. "Analyzing the Role of Blockchain in Identity and Access Management Systems." International Journal of Science and Research Archive 12, no. 1 (2024): 2249–56. http://dx.doi.org/10.30574/ijsra.2024.12.1.1019.

Full text
Abstract:
In today's digital world, protecting identities and securing access to sensitive data are crucial tasks. Traditional centralized Identity and Access Management (IAM) systems are vulnerable to data breaches and unauthorized intrusions. Blockchain technology has emerged as a promising solution to bolster IAM systems by decentralizing control and enhancing security measures. This paper explores the integration of blockchain technology into IAM frameworks to address the shortcomings of centralized systems. It examines the fundamental principles of blockchain, highlighting its immutability, decentr
APA, Harvard, Vancouver, ISO, and other styles
26

Hassan, Yewande Goodness, Anuoluwapo Collins, Gideon Opeyemi Babatunde, Abidemi Adeleye Alabi, and Sikirat Damilola Mustapha. "Blockchain and zero-trust identity management system for smart cities and IoT networks." International Journal of Multidisciplinary Research and Growth Evaluation 4, no. 1 (2023): 704–9. https://doi.org/10.54660/.ijmrge.2023.4.1.704-709.

Full text
Abstract:
The rapid proliferation of IoT devices and the development of smart cities necessitate robust identity management systems to address trust and security challenges in interconnected environments. This paper explores integrating blockchain technology and zero-trust principles as a transformative approach to identity management in IoT ecosystems. Blockchain’s decentralized and immutable architecture ensures secure data exchange and identity verification, while zero-trust principles enforce continuous authentication and granular access control. The review highlights current frameworks, identifies
APA, Harvard, Vancouver, ISO, and other styles
27

Akindotei, Odunayo, Igba Emmanuel, Babatunde Olusola Awotiwon, and Adah Otakwu. "Blockchain Integration in Critical Systems Enhancing Transparency, Efficiency, and Real-Time Data Security in Agile Project Management, Decentralized Finance (DeFi), and Cold Chain Management." International Journal of Scientific Research and Modern Technology (IJSRMT) 3, no. 11 (2024): 19–35. http://dx.doi.org/10.38124/ijsrmt.v3i11.107.

Full text
Abstract:
Blockchain technology has garnered significant attention for its potential to revolutionize critical systems by enhancing transparency, efficiency, and data security. This review examines the integration of blockchain in three essential domains: Agile Project Management, Decentralized Finance (DeFi), and Cold Chain Management. By leveraging decentralized ledgers and smart contracts, blockchain provides a robust framework for real-time tracking, data integrity, and automated compliance, addressing long-standing challenges across these sectors. In Agile Project Management, blockchain fosters sea
APA, Harvard, Vancouver, ISO, and other styles
28

BRĂCĂCESCU, RALUCA VERONICA, ŞTEFAN MOCANU, ANCA DANIELA IONIŢĂ, and CARMEN BRĂCĂCESCU. "A PROPOSAL OF DIGITAL IDENTITY MANAGEMENT USING BLOCKCHAIN." REVUE ROUMAINE DES SCIENCES TECHNIQUES — SÉRIE ÉLECTROTECHNIQUE ET ÉNERGÉTIQUE 69, no. 1 (2024): 85–90. http://dx.doi.org/10.59277/rrst-ee.2024.1.15.

Full text
Abstract:
Digital identity is the representation of a person in the digital environment. Nowadays, digital identity has become a very important topic when most activities are moved to the online world. To be secured and respect data privacy, this digital identity must be controlled by its owner, not any other third parties. This paper aims to propose a system for digital identity, presenting its architecture, features, and implementation specifications. This system brings advantages that will also be exposed along with real-life use case scenarios, all proving the necessity of transitioning to a modern
APA, Harvard, Vancouver, ISO, and other styles
29

AlBadi, Asma Hamed salem, Aisha Salim Rashid AlShibli, Dhiya Hamed Ali AlSaqri, and Arwa Khalfan AlSariri. "Adapting Blockchain for Secure and Efficient Identity Management in Oman's e-Government." International Journal of Membrane Science and Technology 10, no. 4 (2023): 1309–18. http://dx.doi.org/10.15379/ijmst.v10i4.2245.

Full text
Abstract:
This research paper examines the potential application of blockchain technology in e-government identity management, with a specific focus on the case of Oman. Traditional centralized identity systems in e-government face various challenges, such as security vulnerabilities and limited compatibility among government agencies. By utilizing the decentralized and unalterable characteristics of blockchain, Oman can enhance the security, privacy, efficiency, and transparency of identity management in e-government. The advantages include improved security and privacy, streamlined processes, data sha
APA, Harvard, Vancouver, ISO, and other styles
30

Ganapathy, Venkatasubramanian. "Decentralized Identity Verification in Metaverse Auditing Using Blockchain Technology." Shodh Sari-An International Multidisciplinary Journal 03, no. 03 (2024): 66–88. http://dx.doi.org/10.59231/sari7719.

Full text
Abstract:
This research paper presents a comprehensive review of decentralized identity verification in the context of metaverse auditing, leveraging blockchain technology. With the rapid evolution of virtual environments and the emergence of the metaverse, ensuring trust, transparency, and security becomes paramount. Traditional centralized identity verification systems face challenges in such decentralized and dynamic environments. Blockchain technology offers promising solutions by providing a transparent, immutable, and decentralized ledger for identity management and verification. Conceptual Analys
APA, Harvard, Vancouver, ISO, and other styles
31

Hindarto, Djarot. "Blockchain-Based Academic Identity and Transcript Management in University Enterprise Architecture." sinkron 8, no. 4 (2023): 2547–59. http://dx.doi.org/10.33395/sinkron.v8i4.12978.

Full text
Abstract:
The present research examines the implementation of Blockchain-based Identity and Academic Transcript Management in a university's enterprise architecture. This research is motivated by the increasing demand for secure, transparent, and efficient student identity management and the need to store easily verifiable academic transcripts. Blockchain technology has been spotlighted because it provides security and data integrity solutions. This research aims to determine if integrating Blockchain into the University's Enterprise Architecture can improve the management of student identities and acad
APA, Harvard, Vancouver, ISO, and other styles
32

Ozdenizci Kose, Busra, Vedat Coskun, Arslan Coskun, and Senol Yaya. "A Blockchain-Enhanced Self-Sovereign Identity Platform for Corporate Resource Security." Advances in Cyber-Physical Systems 8, no. 2 (2023): 111–17. http://dx.doi.org/10.23939/acps2023.02.111.

Full text
Abstract:
In an era dominated by concerns of data breaches, and identity theft, security of corporate resources and assets has become paramount. Centralized identity management systems traditionally present vulnerabilities that can fundamentally threaten corporate security. This paper introduces a novel platform to identity management in organizations, leveraging the principles of Self-Sovereign Identity (SSI) and the technological robustness of block- chain. By giving individuals unwavering control over their digital identities and reducing dependence on centralized intermediaries, SSI provides a trans
APA, Harvard, Vancouver, ISO, and other styles
33

Song, Zhiming, Guiwen Wang, Yimin Yu, and Taowei Chen. "Digital Identity Verification and Management System of Blockchain-Based Verifiable Certificate with the Privacy Protection of Identity and Behavior." Security and Communication Networks 2022 (November 30, 2022): 1–24. http://dx.doi.org/10.1155/2022/6800938.

Full text
Abstract:
Due to the advantages in self-sovereignty identity management and scalability of blockchain, digital identity verification and management systems (DIVMS) of blockchain-based verifiable certificates (VC) are getting more and more attention. However, user privacy in the systems’ traditional architectures cannot be guaranteed. In this paper, the zero-knowledge succinct noninteractive arguments of knowledge (zkSNARKs) referred to as Groth16 are introduced in order to implement privacy protection of the user’s identity and behavior of DIVMS of blockchain-based VC. In the proposed architecture, the
APA, Harvard, Vancouver, ISO, and other styles
34

Ma, Biao, and Haifeng Qian. "A scalable identity management scheme via blockchain: Identity protection and traceability." Peer-to-Peer Networking and Applications 18, no. 1 (2024): 1–12. http://dx.doi.org/10.1007/s12083-024-01866-w.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Bouras, Mohammed Amine, Qinghua Lu, Sahraoui Dhelim, and Huansheng Ning. "A Lightweight Blockchain-Based IoT Identity Management Approach." Future Internet 13, no. 2 (2021): 24. http://dx.doi.org/10.3390/fi13020024.

Full text
Abstract:
Identity management is a fundamental feature of Internet of Things (IoT) ecosystem, particularly for IoT data access control. However, most of the actual works adopt centralized approaches, which could lead to a single point of failure and privacy issues that are tied to the use of a trusted third parties. A consortium blockchain is an emerging technology that provides a neutral and trustable computation and storage platform that is suitable for building identity management solutions for IoT. This paper proposes a lightweight architecture and the associated protocols for consortium blockchain-
APA, Harvard, Vancouver, ISO, and other styles
36

Yawalkar, Prashant Madhukar, Deepak Narayan Paithankar, Abhijeet Rajendra Pabale, Rushikesh Vilas Kolhe, and P. William. "Integrated identity and auditing management using blockchain mechanism." Measurement: Sensors 27 (June 2023): 100732. http://dx.doi.org/10.1016/j.measen.2023.100732.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Vasselin, Francoise. "Blockchain for Migrants: Promoting Self-Sovereign Identity and Financial Inclusion." International Journal of Business Administration 15, no. 4 (2024): 39. https://doi.org/10.5430/ijba.v15n4p39.

Full text
Abstract:
This article explores the potential of Distributed Ledger Technology (DLT), with a focus on blockchain, to address key challenges related to the security, ownership, and management of personal data. We trace the foundational work of Haber and Stornetta, who introduced the core principles of blockchain to secure digital records within the real economy. Building on this, Nakamoto’s innovations in blockchain technology introduced a native crypto-asset, which not only aligns and concentrates the interests of network participants but also resolves the previously unsolved “double-spending problem.”
APA, Harvard, Vancouver, ISO, and other styles
38

Polu, Achuthananda Reddy, Bhumeka Narra, Dheeraj Varun Kumar Reddy Buddula, Hari Hara Sudheer Patchipulusu, Navya Vattikonda, and Anuj Kumar Gupta. "BLOCKCHAIN TECHNOLOGY AS A TOOL FOR CYBERSECURITY: STRENGTHS, WEAKNESSES, AND POTENTIAL APPLICATIONS." ACCENT JOURNAL OF ECONOMICS ECOLOGY & ENGINEERING 07, no. 08 (2025): 167–74. https://doi.org/10.63665/ajeee.v07i08.01.

Full text
Abstract:
Blockchain technology functions as a security solution at the advanced level because its decentralized system along with cryptographic security measures and immutable data storage work together. Blockchain technology reduces security risks because it operates differently from centralized authorities thus protecting against solitary weak points unauthorized data modification and identity theft. The technology handles three main domains including secure communication and identity management with fraud prevention functions which improve data trustworthiness between digital senders and recipients.
APA, Harvard, Vancouver, ISO, and other styles
39

Achuthananda, Reddy Polu Bhumeka Narra Dheeraj Varun Kumar Reddy Buddula Hari Hara Sudheer Patchipulusu Navya Vattikonda and Anuj Kumar Gupta. "BLOCKCHAIN TECHNOLOGY AS A TOOL FOR CYBERSECURITY: STRENGTHS, WEAKNESSES, AND POTENTIAL APPLICATIONS." ACCENT JOURNAL OF ECONOMICS ECOLOGY & ENGINEERING 07, no. 08 (2022): 167–74. https://doi.org/10.5281/zenodo.15335349.

Full text
Abstract:
Blockchain technology functions as a security solution at the advanced level because its decentralized system along with cryptographic security measures and immutable data storage work together. Blockchain technolo gy reduces security risks because it operates differently from centralized authorities thus protecting against solitary weak points unauthorized data modification and identity theft. The technology handles three main domains including secure communication and identity management with fraud prevention functions which improve data trustworthiness between digital senders and recipients
APA, Harvard, Vancouver, ISO, and other styles
40

Bouras, Mohammed Amine, Qinghua Lu, Fan Zhang, Yueliang Wan, Tao Zhang, and Huansheng Ning. "Distributed Ledger Technology for eHealth Identity Privacy: State of The Art and Future Perspective." Sensors 20, no. 2 (2020): 483. http://dx.doi.org/10.3390/s20020483.

Full text
Abstract:
Electronic healthcare (eHealth) identity management (IdM) is a pivotal feature in the eHealth system. Distributed ledger technology (DLT) is an emerging technology that can achieve agreements of transactional data states in a decentralized way. Building identity management systems using Blockchain can enable patients to fully control their own identity and provide increased confidence in data immutability and availability. This paper presents the state of the art of decentralized identity management using Blockchain and highlights the possible opportunities for adopting the decentralized ident
APA, Harvard, Vancouver, ISO, and other styles
41

Journal, of Global Research in Multidisciplinary Studies(JGRMS). "Blockchain for Secure Identity Management: A Review on Decentralized Authentication Systems." Journal of Global Research in Multidisciplinary Studies(JGRMS) 01, no. 02 (2025): 01–06. https://doi.org/10.5281/zenodo.15245191.

Full text
Abstract:
The rise of blockchain technology has revolutionized identity management by introducing decentralized, secure, and user-centric systems. The capacity of blockchain-based identity management solutions to circumvent the drawbacks of conventional centralized approaches is the primary emphasis of this analysis. Here, we take a look at several important ideas like decentralized trustworthy identity (DTI) and self-sovereign identity (SSI), and we see how they improve privacy and security while giving users more powers over their own data. The paper also analyzes the role of cryptographic protocols,
APA, Harvard, Vancouver, ISO, and other styles
42

Seyam, Huda, and Adib Habbal. "A Systematic Review of Blockchain-based Identity Management Solutions." International Conference on Recent Academic Studies 1 (May 18, 2023): 246–53. http://dx.doi.org/10.59287/icras.712.

Full text
Abstract:
The involvement of digital identity in almost all online services contributes to the growing reliance on Identity Management Systems (IDMS) that establish, verify, and manage digital identities. However, digital identities are still kept in central repositories. Which are controlled by a single authority that may have many vulnerabilities due to low security, leading attackers to exploit these vulnerabilities and causing various security breaches such as identity theft or disclosure of sensitive information. Additionally, powerful entities who have access to these repositories, could gather an
APA, Harvard, Vancouver, ISO, and other styles
43

Javed, Ibrahim Tariq, Fares Alharbi, Badr Bellaj, Tiziana Margaria, Noel Crespi, and Kashif Naseer Qureshi. "Health-ID: A Blockchain-Based Decentralized Identity Management for Remote Healthcare." Healthcare 9, no. 6 (2021): 712. http://dx.doi.org/10.3390/healthcare9060712.

Full text
Abstract:
COVID-19 has made eHealth an imperative. The pandemic has been a true catalyst for remote eHealth solutions such as teleHealth. Telehealth facilitates care, diagnoses, and treatment remotely, making them more efficient, accessible, and economical. However, they have a centralized identity management system that restricts the interoperability of patient and healthcare provider identification. Thus, creating silos of users that are unable to authenticate themselves beyond their eHealth application’s domain. Furthermore, the consumers of remote eHealth applications are forced to trust their servi
APA, Harvard, Vancouver, ISO, and other styles
44

Bhattad, Bharti, and Arpit Gupta. "Blockchain Based Supply Management System." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem44465.

Full text
Abstract:
The emergence of supply management systems revolutionized global data exchange, providing a broader platform for sharing information, personal data and digital goods but despite its many advantages, the use of supply management systems is a burden a host of data governance and privacy challenges , a growing number of platforms involved in data theft, susceptibility to data breaches, susceptibility to identity theft, and the spread of fake news are often involved in extensive data management to facilitate targeted advertising and increase profitability. In response to these challenges, our prop
APA, Harvard, Vancouver, ISO, and other styles
45

Yogesh, Dhotre, B. S. Sonawane Dr., and Smita Kasar Dr. "Implementation of the Ethereum Blockchain for Supply Chain Management." Advanced Innovations in Computer Programming Languages 6, no. 2 (2024): 1–15. https://doi.org/10.5281/zenodo.10653183.

Full text
Abstract:
<em>This research looks at unique identity systems in supply chain management and how self-sovereign identities foster trust among the issuer, entity, and verifier. The article investigates blockchain technology in supply chain systems. According to recent research, blockchain applications may increase transparency, traceability, and efficiency in manufacturing and distribution. To increase privacy and transparency in end-to-end monitoring, the research advises incorporating self-sovereign identity into the supply chain. The study examines blockchain performance, including transaction and read
APA, Harvard, Vancouver, ISO, and other styles
46

Kumar, Abhishek. "Harnessing Blockchain and Smart Contracts for Next-Generation Digital Identity: Enhancing Security and Privacy." International Journal for Research in Applied Science and Engineering Technology 13, no. 2 (2025): 1163–75. https://doi.org/10.22214/ijraset.2025.67058.

Full text
Abstract:
This paper explores the integration of blockchain technology and smart contracts in the development of nextgeneration digital identity solutions. As the demand for secure, privacy-preserving, and user-centric identity management systems increases, blockchain and smart contracts offer a promising framework that enhances transparency, automation, and user control. We outline the methodology employed to assess the effectiveness of blockchain and smart contracts in digital identity management, focusing on aspects such as security, interoperability, and user empowerment. Through comprehensive data
APA, Harvard, Vancouver, ISO, and other styles
47

Olanrewaju, Oluwaseun Ajayi, Elizabeth Alozie Chisom, and Anthony Abieba Olumese. "Blockchain's Transformative Potential in Securing Digital Identities and Personal Data." Engineering and Technology Journal 10, no. 02 (2025): 3798–804. https://doi.org/10.5281/zenodo.14849845.

Full text
Abstract:
This review paper explores the transformative potential of blockchain technology in securing digital identities and personal data. It examines various blockchain applications, including identity verification, self-sovereign identity, and decentralized authentication mechanisms. Despite scalability issues, interoperability concerns, and regulatory hurdles, ongoing developments promise to overcome these obstacles. Future directions in blockchain technology include scalability solutions, interoperability standards, and privacy-enhancing technologies. Additionally, integration with AI and machine
APA, Harvard, Vancouver, ISO, and other styles
48

Sisodia, Kartik, and Garima Sharma. "Block Chain Based Identify Management for Secure & Decentralised Web Application." Radius: Journal of Science and Technology 2, no. 1 (2025): 251009. https://doi.org/10.5281/zenodo.15366215.

Full text
Abstract:
The research presents a blockchain-based identity management system for protecting decentralized web applications by operating through decentralized processes. Through its permissioned Ethereum network The-system enables automatic operations for identity lifecycle management to register authenticate authorize and revoke users while maintaining privacy of user data (anonymization and encryption of user data). Users receive hashed credentials which the blockchain ledger retains forever as secure storage alongside complete PII data privacy. Smart contracts determine access through comparison betw
APA, Harvard, Vancouver, ISO, and other styles
49

Acharya, Praches, Binod Sapkota, Bibat Thokar, and Babu Ram Dawadi. "Streamlining Digital Identity Ecosystem in Nepal: A Private Blockchain Approach." International Journal on Engineering Technology and Infrastructure Development 2, no. 1 (2025): 274–83. https://doi.org/10.3126/injet-indev.v2i1.82539.

Full text
Abstract:
As digitization continues to expand into various aspects of human life, the need for ro- bust user authentication becomes crucial to ensure secure online and digital services. However, the process of verifying one’s identity has become increasingly complex and burdensome, contradicting the initial intentions of simplifying procedures through digitization. This research paper addresses the challenges associated with digital identity verification and proposes an innovative solution. This solution introduces a digital identity ecosystem powered by a private blockchain network, aiming to revolutio
APA, Harvard, Vancouver, ISO, and other styles
50

Niu, Jianlin, and Zhiyu Ren. "A self-sovereign identity management scheme using smart contracts." MATEC Web of Conferences 336 (2021): 08005. http://dx.doi.org/10.1051/matecconf/202133608005.

Full text
Abstract:
The existing self-sovereign identity management schemes have some problems, such as weak availability and security risks. To solve these problems, we proposed a cross-domain self-sovereign identity management scheme using smart contracts. This scheme takes into account the entire lifecycle of identity, especially including the cross-domain use and recovery. To preserve the privacy data of users on the blockchain, we proposed a data storage method of anchoring on blockchain. Finally, we implemented this scheme using the Solidity programming language for smart contract. This scheme has been expe
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!