To see the other types of publications on this topic, follow the link: Decentralized Identity Management.

Journal articles on the topic 'Decentralized Identity Management'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Decentralized Identity Management.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Singla, Ashish, Nakul Gupta, Prageet Aeron, Anshul Jain, Divya Sharma, and Sangeeta Shah Bharadwaj. "Decentralized Identity Management Using Blockchain." Journal of Global Information Management 31, no. 2 (2022): 1–24. http://dx.doi.org/10.4018/jgim.315283.

Full text
Abstract:
This article explores the usage of decentralised identity (DID) management using blockchain in global organisations to support secure usage of information resources. Blockchain as technology was initially introduced as a cryptocurrency and there have been challenges in its adoption for enterprise applications such as identity management. DID is emerging as one of the strong blockchain adoption use cases. Industry pioneers and users across domains have started exploring DID use cases, which help better protect their personal data and application access control as compared to traditional, centra
APA, Harvard, Vancouver, ISO, and other styles
2

Bouras, Mohammed Amine, Qinghua Lu, Fan Zhang, Yueliang Wan, Tao Zhang, and Huansheng Ning. "Distributed Ledger Technology for eHealth Identity Privacy: State of The Art and Future Perspective." Sensors 20, no. 2 (2020): 483. http://dx.doi.org/10.3390/s20020483.

Full text
Abstract:
Electronic healthcare (eHealth) identity management (IdM) is a pivotal feature in the eHealth system. Distributed ledger technology (DLT) is an emerging technology that can achieve agreements of transactional data states in a decentralized way. Building identity management systems using Blockchain can enable patients to fully control their own identity and provide increased confidence in data immutability and availability. This paper presents the state of the art of decentralized identity management using Blockchain and highlights the possible opportunities for adopting the decentralized ident
APA, Harvard, Vancouver, ISO, and other styles
3

Gobika S. and Vaishnavi N. M.Sc., M.Phil., (Ph.D.). "Blockchain Based Identity Management System." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 2 (2025): 1413–20. https://doi.org/10.32628/cseit25112471.

Full text
Abstract:
Traditional identity management systems often suffer from security vulnerabilities, data breaches, and inefficiencies due to centralized control. Blockchain technology offers a decentralized and tamper-resistant alternative for identity management, enhancing security, privacy, and user control. This paper explores a blockchain-based identity management system that leverages decentralized identifiers (DIDs) and verifiable credentials to provide a secure, transparent, and user-centric identity framework. The proposed system ensures data integrity, minimizes identity fraud, and enables seamless a
APA, Harvard, Vancouver, ISO, and other styles
4

Ganapathy, Venkatasubramanian. "Decentralized Identity Verification in Metaverse Auditing Using Blockchain Technology." Shodh Sari-An International Multidisciplinary Journal 03, no. 03 (2024): 66–88. http://dx.doi.org/10.59231/sari7719.

Full text
Abstract:
This research paper presents a comprehensive review of decentralized identity verification in the context of metaverse auditing, leveraging blockchain technology. With the rapid evolution of virtual environments and the emergence of the metaverse, ensuring trust, transparency, and security becomes paramount. Traditional centralized identity verification systems face challenges in such decentralized and dynamic environments. Blockchain technology offers promising solutions by providing a transparent, immutable, and decentralized ledger for identity management and verification. Conceptual Analys
APA, Harvard, Vancouver, ISO, and other styles
5

Researcher. "ADVANCEMENTS IN DECENTRALIZED IDENTITY SOLUTIONS: EMPOWERING USERS THROUGH SELF-SOVEREIGN IDENTITY." International Journal of Computer Engineering and Technology (IJCET) 15, no. 4 (2024): 721–33. https://doi.org/10.5281/zenodo.13374083.

Full text
Abstract:
This article explores the emerging field of decentralized identity solutions, with a focus on self-sovereign identity (SSI) as a transformative approach to digital identity management. It examines the limitations of traditional centralized systems and highlights how decentralized frameworks address these issues by empowering users with control over their personal data. The article discusses key components of SSI, including Decentralized Identifiers (DIDs) and Verifiable Credentials, and explores the potential benefits of these systems in enhancing privacy, security, efficiency, and inclusivity
APA, Harvard, Vancouver, ISO, and other styles
6

Journal, of Global Research in Multidisciplinary Studies(JGRMS). "Blockchain for Secure Identity Management: A Review on Decentralized Authentication Systems." Journal of Global Research in Multidisciplinary Studies(JGRMS) 01, no. 02 (2025): 01–06. https://doi.org/10.5281/zenodo.15245191.

Full text
Abstract:
The rise of blockchain technology has revolutionized identity management by introducing decentralized, secure, and user-centric systems. The capacity of blockchain-based identity management solutions to circumvent the drawbacks of conventional centralized approaches is the primary emphasis of this analysis. Here, we take a look at several important ideas like decentralized trustworthy identity (DTI) and self-sovereign identity (SSI), and we see how they improve privacy and security while giving users more powers over their own data. The paper also analyzes the role of cryptographic protocols,
APA, Harvard, Vancouver, ISO, and other styles
7

Li, Jingxuan, and Yue Jing. "Establishing an International Engagement Model of Digital Identity Based on Blockchain." Mobile Information Systems 2022 (August 30, 2022): 1–7. http://dx.doi.org/10.1155/2022/6988211.

Full text
Abstract:
Blockchain technology has been changing the trust system through machine endorsement and mathematical algorithms, laying a technical foundation for network identity from centralized to decentralized management. The decentralized identity with core features, such as “no need for a management center and self-managed identities” have become a key direction for the evolution of a new generation of digital identity based on blockchain. Internationally, the United States, the EU, and other countries have promoted the technological exploration and application innovation of the decentralized identity,
APA, Harvard, Vancouver, ISO, and other styles
8

Kang Woo Cho, Mi Hyeon Jeon, and Sang Uk Shin. "Hierarchical Sovereignty Management and Access Control based on Self-Sovereign Identity." Research Briefs on Information and Communication Technology Evolution 7 (December 15, 2021): 215–21. http://dx.doi.org/10.56801/rebicte.v7i.131.

Full text
Abstract:
Self-sovereign identity is a type of decentralized identity technology and has been proposed to solvevarious problems of the existing public key infrastructure based centralized identity authenticationservice. In addition, the demand for a secure decentralized access control management (ACM)technique has increased according to the demand for such next-generation identity identificationservice. Accordingly, although various ACM techniques that can be applied to decentralized serviceshave been proposed, most fall into the introductory stage of research. In this paper, based on theSOVRIN-based re
APA, Harvard, Vancouver, ISO, and other styles
9

Deng, Xudong, Chengliang Tian, Fei Chen, and Hequn Xian. "Designated-Verifier Anonymous Credential for Identity Management in Decentralized Systems." Mobile Information Systems 2021 (September 9, 2021): 1–15. http://dx.doi.org/10.1155/2021/2807395.

Full text
Abstract:
Most of the existing identity management is the centralized architecture that has to validate, certify, and manage identity in a centralized approach by trusted authorities. Decentralized identity is causing widespread public concern because it enables to give back control of identity to clients, and the client then has the ability to control when, where, and with whom they share their credentials. A decentralized solution atop on blockchain will bypass the centralized architecture and address the single point of the failure problem. To our knowledge, blockchain is an inherited pseudonym but i
APA, Harvard, Vancouver, ISO, and other styles
10

Prosper Onagie Yusuf, Abdullahi Mai-Auduga, Samuel Omokhafe Yusuf, Emmanuel Joshua, and Caleb Eshikpemi Yusuf. "A decentralized privacy-preserving and scalable blockchain-based identity management system." International Journal of Science and Research Archive 14, no. 2 (2025): 511–26. https://doi.org/10.30574/ijsra.2025.14.2.0368.

Full text
Abstract:
This project proposes a decentralized Identity Management System (IMS) built on blockchain technology, prioritizing user privacy and security. The system enables individuals to create, manage, and share their digital identities securely, leveraging blockchain’s immutability and transparency. By utilizing smart contracts, the IMS ensures identity verification and authentication while maintaining user control and consent. This innovative approach addresses, current identity management challenges, promoting a secure and decentralized digital identity ecosystem. The project’s outcome has far-reach
APA, Harvard, Vancouver, ISO, and other styles
11

Rodionov, Andrey. "The Potential of Blockchain Technology for Creating Decentralized Identity Systems: Technical Capabilities and Legal Regulation." International Journal of Law and Policy 2, no. 4 (2024): 19–30. http://dx.doi.org/10.59022/ijlp.170.

Full text
Abstract:
Decentralized identity systems based on blockchain technology have emerged as a promising solution to the limitations and challenges of traditional centralized identity management. This research explores the potential of blockchain for creating secure, transparent, and user-centric identity systems, focusing on the technical capabilities and legal implications. Through a comprehensive literature review and expert interviews, the study examines the core components of decentralized identity, such as self-sovereign identity and verifiable credentials, and compares them with centralized approaches
APA, Harvard, Vancouver, ISO, and other styles
12

Polychronaki, Maria, Michael G. Xevgenis, Dimitrios G. Kogias, and Hellen C. Leligou. "Decentralized Identity Management for Metaverse-Enhanced Education: A Literature Review." Electronics 13, no. 19 (2024): 3887. http://dx.doi.org/10.3390/electronics13193887.

Full text
Abstract:
As we transition into the era of Web 3.0, where decentralized information and user privacy are paramount, emerging technologies are reshaping the way in which personal data are managed. This paper focuses on decentralized identity management (DID) in the metaverse, particularly within the education sector, which has rapidly embraced digital tools for e-learning, especially since the COVID-19 pandemic. Technologies such as blockchain, artificial intelligence (AI), and virtual and augmented reality (VR/AR) are increasingly integrated into educational platforms, raising questions about privacy, s
APA, Harvard, Vancouver, ISO, and other styles
13

Zhang, Chiyu, and Inseok Hwang. "Multi-target identity management with decentralized optimal sensor scheduling." European Journal of Control 56 (November 2020): 10–37. http://dx.doi.org/10.1016/j.ejcon.2020.01.004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

A, MR A. MURUGAVEL. "Decentralized Identity Management in Cross-Social Network Photo Sharing." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem30036.

Full text
Abstract:
The widespread use of online social networks has resulted in a surge in photo sharing, but the vulnerability of photo privacy becomes apparent when these images are disseminated across multiple platforms. Current solutions often fall short in delivering efficient social network services without compromising user privacy. Introducing PhotoChain, a revolutionary blockchain-based framework designed to facilitate secure photo sharing across social networks. This framework incorporates advanced features, including dissemination control, face masking, photo integrity verification, access control, an
APA, Harvard, Vancouver, ISO, and other styles
15

Akpe, Oyinomomo-emi Emmanuel, Denis Kisina, Samuel Owoade, Abel Chukwuemeke Uzoka, right Chibunna Ubanadu, and Andrew Ifesinachi Daraojimba. "Advances in Federated Authentication and Identity Management for Scalable Digital Platforms." Journal of Frontiers in Multidisciplinary Research 2, no. 1 (2021): 87–93. https://doi.org/10.54660/.ijfmr.2021.2.1.87-93.

Full text
Abstract:
The increasing complexity of digital platforms, driven by cloud-native architectures, distributed applications, and user-centric services, necessitates robust, scalable, and secure identity management frameworks. This paper explores recent advances in federated authentication and identity management, emphasizing their role in enabling seamless and secure access across interconnected digital ecosystems. Beginning with a foundational overview of identity management’s evolution—from traditional siloed systems to federated and decentralized models—the study outlines key technologies such as SAML,
APA, Harvard, Vancouver, ISO, and other styles
16

Alamri, Bandar, Katie Crowley, and Ita Richardson. "Cybersecurity Risk Management Framework for Blockchain Identity Management Systems in Health IoT." Sensors 23, no. 1 (2022): 218. http://dx.doi.org/10.3390/s23010218.

Full text
Abstract:
Blockchain (BC) has recently paved the way for developing Decentralized Identity Management (IdM) systems for different information systems. Researchers widely use it to develop decentralized IdM systems for the Health Internet of Things (HIoT). HIoT is considered a vulnerable system that produces and processes sensitive data. BC-based IdM systems have the potential to be more secure and privacy-aware than centralized IdM systems. However, many studies have shown potential security risks to using BC. A Systematic Literature Review (SLR) conducted by the authors on BC-based IdM systems in HIoT
APA, Harvard, Vancouver, ISO, and other styles
17

Maidine, Khalid, Ahmed EL-Yahyaoui, and Salima Trichni. "Quantum-Resistant Identity Management via ZK-STARKs and Decentralized Storage." Ingénierie des systèmes d information 30, no. 5 (2025): 1297–311. https://doi.org/10.18280/isi.300516.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Oluwatosin Oladayo ARAMIDE. "Identity and Access Management (IAM) for IoT in 5G." Open Access Research Journal of Science and Technology 5, no. 2 (2022): 096–108. https://doi.org/10.53022/oarjst.2022.5.2.0043.

Full text
Abstract:
The widespread use of Internet of Things (IoT) devices and the emergence of 5G have presented intricate security applications especially in identity and access management (IAM). As billions of delicate IoT endpoints are built to interconnect with fives, the usual IAM pattern would challenge to tackle troubles like onboarding devices, supplying identities, controlling accesses, and safe and sound lifecycle management, particularly in a decentralized, dynamic, resource-limited scene. The present paper examines the special issues in IAM to IoT in 5G that revolve around scalability, device diversi
APA, Harvard, Vancouver, ISO, and other styles
19

Bhaskara Garnimitta. "Blockchain-Enabled Decentralized Identity Management: A Novel Framework for Microservices Architecture." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 1 (2025): 1929–36. https://doi.org/10.32628/cseit251112209.

Full text
Abstract:
This article presents a novel framework for implementing decentralized identity management in microservices architecture using blockchain technology. The proposed solution addresses the inherent challenges of traditional centralized identity management systems by leveraging distributed ledger technology and smart contracts to create a secure, transparent, and user-centric authentication mechanism. The framework incorporates comprehensive privacy controls and consent management features while ensuring compliance with regulatory requirements across various industries. Through extensive evaluatio
APA, Harvard, Vancouver, ISO, and other styles
20

Liu, Yuhao. "A Framework for Decentralized Identity and Credential Management Leveraging Blockchain Technology." Advances in Economics, Management and Political Sciences 103, no. 1 (2024): 108–20. http://dx.doi.org/10.54254/2754-1169/103/20242354.

Full text
Abstract:
Abstract: As internet technology rapidly advances and the infrastructure continues to evolve, web applications have become an integral part of our daily lives, with electronic identities (e-identities) playing a crucial role. Today, e-identities are vital for verifying personal identity in numerous online activities, and as our dependence on them grows, so does the concern for their security. This increasing importance of e-identity security raises various challenges, highlighting the need for robust solutions. In response to these challenges, this article introduces a novel solution: a blockc
APA, Harvard, Vancouver, ISO, and other styles
21

Javed, Ibrahim Tariq, Fares Alharbi, Badr Bellaj, Tiziana Margaria, Noel Crespi, and Kashif Naseer Qureshi. "Health-ID: A Blockchain-Based Decentralized Identity Management for Remote Healthcare." Healthcare 9, no. 6 (2021): 712. http://dx.doi.org/10.3390/healthcare9060712.

Full text
Abstract:
COVID-19 has made eHealth an imperative. The pandemic has been a true catalyst for remote eHealth solutions such as teleHealth. Telehealth facilitates care, diagnoses, and treatment remotely, making them more efficient, accessible, and economical. However, they have a centralized identity management system that restricts the interoperability of patient and healthcare provider identification. Thus, creating silos of users that are unable to authenticate themselves beyond their eHealth application’s domain. Furthermore, the consumers of remote eHealth applications are forced to trust their servi
APA, Harvard, Vancouver, ISO, and other styles
22

Papatheodorou, Nikos, George Hatzivasilis, and Nikos Papadakis. "The YouGovern Secure Blockchain-Based Self-Sovereign Identity (SSI) Management and Access Control." Applied Sciences 15, no. 12 (2025): 6437. https://doi.org/10.3390/app15126437.

Full text
Abstract:
Self-sovereign identity (SSI) is an emerging model for digital identity management that empowers individuals to control their credentials without reliance on centralized authorities. This work presents YouGovern, a blockchain-based SSI system deployed on Binance Smart Chain (BSC) and compliant with W3C Decentralized Identifier (DID) standards. The architecture includes smart contracts for access control, decentralized storage using the Inter Planetary File System (IPFS), and long-term persistence via Web3.Storage. YouGovern enables users to register, share, and revoke identities while preservi
APA, Harvard, Vancouver, ISO, and other styles
23

Shetye, Gauri, Nandini Sonar, and Dr Dhanamma Jagli. "Blockchain-based Self-sovereign Identity Management System." International Journal for Research in Applied Science and Engineering Technology 10, no. 6 (2022): 2128–31. http://dx.doi.org/10.22214/ijraset.2022.44335.

Full text
Abstract:
Abstract - The whole concept of self-sovereign identity (SSI) is gaining a lot of optimism, with the emerging Blockchain Technology in the current tech-scenario. It is a major change in how online interactions will take place in the future considering the identity of each user. The different aspects of SSI are examined by various works in the literature This paper surveys the origin of identity, various digital identity models and how it leads to self-sovereign identity. It then goes on to discuss related research, as well as the SSI's building blocks, which include decentralized IDs, verifiab
APA, Harvard, Vancouver, ISO, and other styles
24

Rai, Bipin Kumar, Pranjal Sharma, Sagar Singhal, and Basavaraj S. Paruti. "Decentralized Blockchain-Enabled Employee Authentication System." International Journal of Reliable and Quality E-Healthcare 12, no. 1 (2023): 1–13. http://dx.doi.org/10.4018/ijrqeh.323570.

Full text
Abstract:
In recent years, there have been many attempts to introduce blockchain-based identity management solutions, which allow the user to take over control of his/her own identity. In this paper, the authors have reviewed in-depth existing blockchain-based identity management papers and patents published online. Based on that analysis of the literature, a system will be implemented which will come up with the current issues and try to minimize them. Being transparent, immutable, and decentralized in nature, blockchain mechanism is found to be a better technology which can reduce the corruption in th
APA, Harvard, Vancouver, ISO, and other styles
25

Jia, Xudong, Ning Hu, Shi Yin, Yan Zhao, Chi Zhang, and Xinda Cheng. "A2 Chain: A Blockchain-Based Decentralized Authentication Scheme for 5G-Enabled IoT." Mobile Information Systems 2020 (December 21, 2020): 1–19. http://dx.doi.org/10.1155/2020/8889192.

Full text
Abstract:
The fifth-generation mobile communication technology (5G) provides high-bandwidth and low-latency data channels for massive IoT terminals to access the core business network. At the same time, it also brings higher security threats and challenges. Terminal identity authentication is an important security mechanism to ensure the core business network; however, most of the existing solutions adopt a centralized authentication model. Once the number of authentication requests exceeds the processing capacity of the authentication center service, it will cause authentication request congestion or d
APA, Harvard, Vancouver, ISO, and other styles
26

Ranga, Premsai. "Blockchain Technology in Identity Management: Enhancing Cybersecurity Frameworks." International Journal of Innovative Research in Engineering & Multidisciplinary Physical Sciences 11, no. 6 (2023): 1–16. https://doi.org/10.5281/zenodo.14280061.

Full text
Abstract:
Identity management is a critical component of cybersecurity, ensuring that only authorized individuals can access sensitive systems and data. Traditional identity management systems, which rely on centralized databases, face growing challenges related to data breaches, unauthorized access, and identity theft. Blockchain technology, with its decentralized, transparent, and tamper-resistant nature, has emerged as a promising solution to enhance identity management frameworks and improve overall cybersecurity.This paper proposes a novel identity management framework leveraging blockchain technol
APA, Harvard, Vancouver, ISO, and other styles
27

Olanrewaju, Oluwaseun Ajayi, Elizabeth Alozie Chisom, and Anthony Abieba Olumese. "Blockchain's Transformative Potential in Securing Digital Identities and Personal Data." Engineering and Technology Journal 10, no. 02 (2025): 3798–804. https://doi.org/10.5281/zenodo.14849845.

Full text
Abstract:
This review paper explores the transformative potential of blockchain technology in securing digital identities and personal data. It examines various blockchain applications, including identity verification, self-sovereign identity, and decentralized authentication mechanisms. Despite scalability issues, interoperability concerns, and regulatory hurdles, ongoing developments promise to overcome these obstacles. Future directions in blockchain technology include scalability solutions, interoperability standards, and privacy-enhancing technologies. Additionally, integration with AI and machine
APA, Harvard, Vancouver, ISO, and other styles
28

Vasuki, M. "The Impact of Blockchain on Digital Identity Management." International Journal for Research in Applied Science and Engineering Technology 11, no. 7 (2023): 290–94. http://dx.doi.org/10.22214/ijraset.2023.54616.

Full text
Abstract:
Abstract: This journal explores the profound influence of blockchain technology on the realm of digital identity management. As traditional identity systems face significant challenges in terms of security, privacy, and interoperability, blockchain emerges as a promising solution with its decentralized and immutable nature. This paper delves into the key aspects of blockchain technology that contribute to enhancing digital identity management, including decentralization, transparency, security, privacy, and interoperability. The potential benefits and challenges of implementing blockchain-base
APA, Harvard, Vancouver, ISO, and other styles
29

Hardjono, Thomas. "Federated Authorization over Access to Personal Data for Decentralized Identity Management." IEEE Communications Standards Magazine 3, no. 4 (2019): 32–38. http://dx.doi.org/10.1109/mcomstd.001.1900019.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Dib, Omar, and Khalifa Toumi. "Decentralized Identity Systems: Architecture, Challenges, Solutions and Future Directions." Annals of Emerging Technologies in Computing 4, no. 5 (2020): 19–40. http://dx.doi.org/10.33166/aetic.2020.05.002.

Full text
Abstract:
Due to the exponential rise of the Internet in the last two decades, the digital presence has seen an enormous increase. Today, billions of people, devices and objects are digitally connected making the interactions much easier than before. To securely establish this connectivity in the digital era, proving digital identities has become crucial. Due to this, a growing number of organizations are building solutions that establish, verify and manage digital identities. Yet, a solution whereby digital identities and their associated data are efficiently managed is still far from being achieved. T
APA, Harvard, Vancouver, ISO, and other styles
31

Gregory, H. Jackson, and Taiuru Karaitiana. "MECHANISMS FOR DIGITAL TRANSFORMATION IN THE EDUCATION AND HEALTHCARE SECTORS UTILIZING DECENTRALIZED SELF-SOVEREIGN IDENTITY." International Journal of Network Security & Its Applications (IJNSA) 15, no. 2 (2023): 01–21. https://doi.org/10.5281/zenodo.7800411.

Full text
Abstract:
This paper argues for the consideration of a decentralized, open, interoperable identity framework as a secure, scalable, user-centered meta-platform capable of leveraging many aggregate network advantages and delivery options for education and healthcare providers. An overview of the shortfalls and vulnerabilities of the current Internet and systems for identity management is first explained, followed by a summary of the status of development and primary proponents of decentralized, blockchain-enabled, self-sovereign identification (SSI). An examination of the Key Event Receipt Infrastructure
APA, Harvard, Vancouver, ISO, and other styles
32

Bhattad, Bharti, and Arpit Gupta. "Blockchain Based Supply Management System." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem44465.

Full text
Abstract:
The emergence of supply management systems revolutionized global data exchange, providing a broader platform for sharing information, personal data and digital goods but despite its many advantages, the use of supply management systems is a burden a host of data governance and privacy challenges , a growing number of platforms involved in data theft, susceptibility to data breaches, susceptibility to identity theft, and the spread of fake news are often involved in extensive data management to facilitate targeted advertising and increase profitability. In response to these challenges, our prop
APA, Harvard, Vancouver, ISO, and other styles
33

Sadique, Kazi Masum, Rahim Rahmani, and Paul Johannesson. "DIdM-EIoTD: Distributed Identity Management for Edge Internet of Things (IoT) Devices." Sensors 23, no. 8 (2023): 4046. http://dx.doi.org/10.3390/s23084046.

Full text
Abstract:
The Internet of Things (IoT) paradigm aims to enhance human society and living standards with the vast deployment of smart and autonomous devices, which requires seamless collaboration. The number of connected devices increases daily, introducing identity management requirements for edge IoT devices. Due to IoT devices’ heterogeneity and resource-constrained configuration, traditional identity management systems are not feasible. As a result, identity management for IoT devices is still an open issue. Distributed Ledger Technology (DLT) and blockchain-based security solutions are becoming popu
APA, Harvard, Vancouver, ISO, and other styles
34

Jackson, Gregory H., and Karaitiana Taiuru. "Mechanisms for Digital Transformation in the Education and Healthcare Sectors Utilizing Decentralized Self-Sovereign Identity." International Journal of Network Security & Its Applications 15, no. 2 (2023): 1–21. http://dx.doi.org/10.5121/ijnsa.2023.15201.

Full text
Abstract:
This paper argues for the consideration of a decentralized, open, interoperable identity framework as a secure, scalable, user-centered meta-platform capable of leveraging many aggregate network advantages and delivery options for education and healthcare providers. An overview of the shortfalls and vulnerabilities of the current Internet and systems for identity management is first explained, followed by a summary of the status of development and primary proponents of decentralized, blockchain-enabled, selfsovereign identification (SSI). An examination of the Key Event Receipt Infrastructure
APA, Harvard, Vancouver, ISO, and other styles
35

Kshitij Varshney. "Digital Identity Management Using Biometric Systems: BioTrace." Journal of Information Systems Engineering and Management 10, no. 51s (2025): 374–85. https://doi.org/10.52783/jisem.v10i51s.10396.

Full text
Abstract:
In an increasingly digital world, establishing secure and reliable methods for verifying identity has become a critical priority across sectors such as finance, healthcare, education, and e-governance. Traditional authentication mechanisms—relying on passwords, personal identification numbers, and physical documents—are increasingly susceptible to fraud, data breaches, and user inconvenience. This paper presents a multi-modal biometric framework for digital identity management, integrating facial recognition and fingerprint verification to enhance accuracy, reduce fraud, and ensure user-centri
APA, Harvard, Vancouver, ISO, and other styles
36

Ramírez-Gordillo, Tamai, Antonio Maciá-Lillo, Francisco A. Pujol, Nahuel García-D’Urso, Jorge Azorín-López, and Higinio Mora. "Decentralized Identity Management for Internet of Things (IoT) Devices Using IOTA Blockchain Technology." Future Internet 17, no. 1 (2025): 49. https://doi.org/10.3390/fi17010049.

Full text
Abstract:
The exponential growth of the Internet of Things (IoT) necessitates robust, scalable, and secure identity management solutions to handle the vast number of interconnected devices. Traditional centralized identity systems are increasingly inadequate due to their vulnerabilities, such as single points of failure, scalability issues, and limited user control over data. This study explores a decentralized identity management model leveraging the IOTA Tangle, a Directed Acyclic Graph (DAG)-based distributed ledger technology, to address these challenges. By integrating Decentralized Identifiers (DI
APA, Harvard, Vancouver, ISO, and other styles
37

Shailaja Lohar. "Decentralization of Identity using Ethereum and IPFS." Communications on Applied Nonlinear Analysis 31, no. 4s (2024): 378–91. http://dx.doi.org/10.52783/cana.v31.917.

Full text
Abstract:
Introduction: The Identity of a user in digital world is an important factor for an individual. Identity management has been handled by various models which, over the period of time have been prone various security breaches. The foremost integral part of any identity model is the centralized storage, access of data. Considering this, in recent years, there has been evolution from centralization to de-centralization of Identity management. With respect to this new aspect, this paper proposes a solution to the centralized management problems, as a decentralized Identity Management System. The sa
APA, Harvard, Vancouver, ISO, and other styles
38

Sisodia, Kartik, and Garima Sharma. "Block Chain Based Identify Management for Secure & Decentralised Web Application." Radius: Journal of Science and Technology 2, no. 1 (2025): 251009. https://doi.org/10.5281/zenodo.15366215.

Full text
Abstract:
The research presents a blockchain-based identity management system for protecting decentralized web applications by operating through decentralized processes. Through its permissioned Ethereum network The-system enables automatic operations for identity lifecycle management to register authenticate authorize and revoke users while maintaining privacy of user data (anonymization and encryption of user data). Users receive hashed credentials which the blockchain ledger retains forever as secure storage alongside complete PII data privacy. Smart contracts determine access through comparison betw
APA, Harvard, Vancouver, ISO, and other styles
39

Bhasker Reddy Ande. "AI-Driven Decentralized Identity Access Management: Leveraging Blockchain, DIDs, and Self-Sovereign Identity for Secure Authentication." Journal of Information Systems Engineering and Management 10, no. 35s (2025): 36–47. https://doi.org/10.52783/jisem.v10i35s.5920.

Full text
Abstract:
Victory of digital services has produced new problems for identity management and security systems operating within online networks. The authentication systems that operate from central locations have become more susceptible to privacy breaches in addition to experiencing rising data security risks. This research develops a new identity access management solution which integrates AI alongside Blockchain and DIDs alongside SSI technology to enhance user-controlled security elements. AMD-SSI technology unions enable end-users to govern their digital personae independently from any control effort
APA, Harvard, Vancouver, ISO, and other styles
40

Vinod, Veeramachaneni. "Decentralized Trust Management in Web 3.0: A Comprehensive Approach to Network Security." Recent Innovations in Wireless Network Security 7, no. 1 (2024): 9–26. https://doi.org/10.5281/zenodo.14161410.

Full text
Abstract:
<em>This paper investigates decentralized trust management as a foundational element of Web 3.0, emphasizing a secure, autonomous, and user-driven approach to online interactions without reliance on centralized authorities. We address key challenges in decentralized environments, including those in Decentralized Finance (DeFi), decentralized identity (DID) systems, and Web 3.0 governance models. Our proposed framework integrates blockchain, Proof of Stake (PoS) consensus, Decentralized Identifiers, Zero-Knowledge Proofs (ZKPs), and smart contracts to create a comprehensive, secure, and scalabl
APA, Harvard, Vancouver, ISO, and other styles
41

Soltani, Reza, Uyen Trang Nguyen, and Aijun An. "A Survey of Self-Sovereign Identity Ecosystem." Security and Communication Networks 2021 (July 17, 2021): 1–26. http://dx.doi.org/10.1155/2021/8873429.

Full text
Abstract:
Self-sovereign identity is the next evolution of identity management models. This survey takes a journey through the origin of identity, defining digital identity and progressive iterations of digital identity models leading up to self-sovereign identity. It then states the relevant research initiatives, platforms, projects, and regulatory frameworks, as well as the building blocks including decentralized identifiers, verifiable credentials, distributed ledger, and various privacy engineering protocols. Finally, the survey provides an overview of the key challenges and research opportunities a
APA, Harvard, Vancouver, ISO, and other styles
42

Alanzi, Haifa Mohammed, and Mohammad Alkhatib. "Blockchain-Based Identity Management System Prototype for Enhanced Privacy and Security." Electronics 14, no. 13 (2025): 2605. https://doi.org/10.3390/electronics14132605.

Full text
Abstract:
An Identity Management System (IDMS) is responsible for managing and organizing identities and credentials exchanged between users, Identity Providers (IDPs), and Service Providers (SPs). The primary goal of IDMS is to ensure the confidentiality and privacy of users’ personal data. Traditional IDMS relies on a third party to store user information and authenticate the user. However, this approach poses threats to user privacy and increases the risk of single point of failure (SPOF), user tracking, and data unavailability. In contrast, decentralized IDMSs that use blockchain technology offer po
APA, Harvard, Vancouver, ISO, and other styles
43

Gahlawat, Monica. "Survey of Online Identity Management Techniques on Blockchain." International Journal of Security and Privacy in Pervasive Computing 12, no. 4 (2020): 19–28. http://dx.doi.org/10.4018/ijsppc.2020100102.

Full text
Abstract:
Secure identity management is one of the controversial topics in the cybersecurity landscape. The user needs to rely on third-party providers for managing their personal information, which is a big security concern. Traditional identity systems typically suffer from single points of failure, lack of interoperability, and privacy issues such as encouraging mass data collection and user tracking. Blockchain technology has the potential to support novel data ownership and governance models with built-in control and consent mechanisms, which may benefit both users and businesses by alleviating the
APA, Harvard, Vancouver, ISO, and other styles
44

Xu, Bowen, Zhijintong Zhang, Aozhuo Sun, et al. "T-FIM: Transparency in Federated Identity Management for Decentralized Trust and Forensics Investigation." Electronics 12, no. 17 (2023): 3591. http://dx.doi.org/10.3390/electronics12173591.

Full text
Abstract:
Federated Identity Management (FIM) has gained significant adoption as a means to simplify user authentication and service authorization across diverse domains. It serves as a centralized authentication and authorization method, enabling users to access various applications or resources using credentials issued by a universally trusted identity provider (IdP). However, recent security incidents indicate that the reliability of credentials issued by IdP is not absolute in practice. If the IdP fails, it can persistently access any application that trusts it as any user. This poses a significant
APA, Harvard, Vancouver, ISO, and other styles
45

Brindha, S. Former Assistant Professor of Business Administration, and R. D. Assistant Professor Department of Computer Science Sivakumar. "BLOCKCHAIN-BASED IDENTITY MANAGEMENT IN FINANCIAL SERVICES." Indian Journal of Research and Development Systems in Technologization 1, no. 1 (2024): 44–56. https://doi.org/10.5281/zenodo.10852538.

Full text
Abstract:
<em>The financial services industry in the rapidly changing times has additional needs for strong, cyber secure, and accurate identity management tool. Traditional method approaches usually meet several barriers like privacy issues, data security, and ineffective authentication processes. This paper sets out how blockchain-based solutions can solve these issues and proposes currently a new approach to identity management in the financial sphere. In view of its distributed and unchangeable character, the paper discusses the possible benefits of incorporating blockchain technology into the field
APA, Harvard, Vancouver, ISO, and other styles
46

Alsayed Kassem, Jamila, Sarwar Sayeed, Hector Marco-Gisbert, Zeeshan Pervez, and Keshav Dahal. "DNS-IdM: A Blockchain Identity Management System to Secure Personal Data Sharing in a Network." Applied Sciences 9, no. 15 (2019): 2953. http://dx.doi.org/10.3390/app9152953.

Full text
Abstract:
Identity management (IdM) is a method used to determine user identities. The centralized aspect of IdM introduces a serious concern with the growing value of personal information, as well as with the General Data Protection Regulation (GDPR). The problem with currently-deployed systems and their dominating approach, with identity providers (IdP) and single-point services, is that a third party is in charge of maintaining and controlling the personal data. The main challenge to manage data securely lies in trusting humans and institutes who are responsible for controlling the entire activity. I
APA, Harvard, Vancouver, ISO, and other styles
47

Preetham Kumar Dammalapati. "Understanding federated identity management: Architecture, protocols and implementation." World Journal of Advanced Engineering Technology and Sciences 15, no. 3 (2025): 401–11. https://doi.org/10.30574/wjaets.2025.15.3.0919.

Full text
Abstract:
Federated Identity Management (FIM) emerges as a critical solution for organizations navigating the complexities of modern digital environments, where identity management across disparate systems presents significant security challenges. By establishing trust relationships between identity providers and service providers, FIM enables seamless authentication across organizational boundaries while maintaining robust security controls. This comprehensive framework eliminates redundant authentication processes, reduces credential proliferation, and addresses the fragmentation issues inherent in mu
APA, Harvard, Vancouver, ISO, and other styles
48

Gujar, Vivek. "IDENTITY MANAGEMENT, SSI AND BLOCKCHAIN: A REVIEW." International Journal of Engineering Applied Sciences and Technology 08, no. 07 (2023): 38–45. http://dx.doi.org/10.33564/ijeast.2023.v08i07.007.

Full text
Abstract:
As an individual, in the social and digital world, the burden of managing multiple online IDs and passwords, while handling a host of documents e.g passports, driver’s licenses, Social Security/Aadhar cards and medical insurance cards is cumbersome. Identities both in the social and digital world requires security and privacy: managing these identities efficiently is called Identity Management. Once these identities established, they are produced, shown, send, verified in some way or the other for various processes in Government and non Government purposes. Lately it is established that Blockc
APA, Harvard, Vancouver, ISO, and other styles
49

L.Swathi, K., P. Divya, A. Amruthavarshini, and Dr B.VijayaBabu. "Implementation of Identity Management Using Open ID Protocol." International Journal of Engineering & Technology 7, no. 2.32 (2018): 104. http://dx.doi.org/10.14419/ijet.v7i2.32.13538.

Full text
Abstract:
Identity Management has turned into an imperative theme in the distributed computing conditions, where cloud suppliers need to control usernames, passwords and other data used to recognize, validate and approve clients for some, unique facilitated applications. Every one of the vulnerabilities seen on non-cloud arrangements are presently found in the cloud, yet different issues are presented. One would be the capacity to oversee characters of clients when sending information to the cloud .Second would be the identity administration of clients accepting information from the cloud. Furthermore,
APA, Harvard, Vancouver, ISO, and other styles
50

Cui, Ping. "Decentralized identity management based on autonomous identity in e-commerce and its application to key opinion leader." IET Conference Proceedings 2024, no. 21 (2025): 331–35. https://doi.org/10.1049/icp.2024.4247.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!