To see the other types of publications on this topic, follow the link: Decentralized Identity Management.

Journal articles on the topic 'Decentralized Identity Management'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Decentralized Identity Management.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Singla, Ashish, Nakul Gupta, Prageet Aeron, Anshul Jain, Divya Sharma, and Sangeeta Shah Bharadwaj. "Decentralized Identity Management Using Blockchain." Journal of Global Information Management 31, no. 2 (2022): 1–24. http://dx.doi.org/10.4018/jgim.315283.

Full text
Abstract:
This article explores the usage of decentralised identity (DID) management using blockchain in global organisations to support secure usage of information resources. Blockchain as technology was initially introduced as a cryptocurrency and there have been challenges in its adoption for enterprise applications such as identity management. DID is emerging as one of the strong blockchain adoption use cases. Industry pioneers and users across domains have started exploring DID use cases, which help better protect their personal data and application access control as compared to traditional, central, or federated identity management models. In this exploratory work, the authors employ qualitative secondary case-based study research methodology to understand the challenges of the current digital identity management landscape and explore the possible benefits of DID as an emerging identity management paradigm. They propose a conceptual cube framework for analysing and studying various DID platforms thereby contributing to both the theory and practice of digitally secure identity.
APA, Harvard, Vancouver, ISO, and other styles
2

Bouras, Mohammed Amine, Qinghua Lu, Fan Zhang, Yueliang Wan, Tao Zhang, and Huansheng Ning. "Distributed Ledger Technology for eHealth Identity Privacy: State of The Art and Future Perspective." Sensors 20, no. 2 (2020): 483. http://dx.doi.org/10.3390/s20020483.

Full text
Abstract:
Electronic healthcare (eHealth) identity management (IdM) is a pivotal feature in the eHealth system. Distributed ledger technology (DLT) is an emerging technology that can achieve agreements of transactional data states in a decentralized way. Building identity management systems using Blockchain can enable patients to fully control their own identity and provide increased confidence in data immutability and availability. This paper presents the state of the art of decentralized identity management using Blockchain and highlights the possible opportunities for adopting the decentralized identity management approaches for future health identity systems. First, we summarize eHealth identity management scenarios. Furthermore, we investigate the existing decentralized identity management solutions and present decentralized identity models. In addition, we discuss the current decentralized identity projects and identify new challenges based on the existing solutions and the limitations when applying it to healthcare as a particular use case.
APA, Harvard, Vancouver, ISO, and other styles
3

Gobika S. and Vaishnavi N. M.Sc., M.Phil., (Ph.D.). "Blockchain Based Identity Management System." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 2 (2025): 1413–20. https://doi.org/10.32628/cseit25112471.

Full text
Abstract:
Traditional identity management systems often suffer from security vulnerabilities, data breaches, and inefficiencies due to centralized control. Blockchain technology offers a decentralized and tamper-resistant alternative for identity management, enhancing security, privacy, and user control. This paper explores a blockchain-based identity management system that leverages decentralized identifiers (DIDs) and verifiable credentials to provide a secure, transparent, and user-centric identity framework. The proposed system ensures data integrity, minimizes identity fraud, and enables seamless authentication across multiple platforms without reliance on a central authority. Additionally, smart contracts facilitate automated verification processes, improving efficiency and reducing the risk of unauthorized access. The study also discusses the potential challenges, such as scalability and regulatory compliance, and proposes solutions to enhance the adoption of blockchain-based identity systems.
APA, Harvard, Vancouver, ISO, and other styles
4

Ganapathy, Venkatasubramanian. "Decentralized Identity Verification in Metaverse Auditing Using Blockchain Technology." Shodh Sari-An International Multidisciplinary Journal 03, no. 03 (2024): 66–88. http://dx.doi.org/10.59231/sari7719.

Full text
Abstract:
This research paper presents a comprehensive review of decentralized identity verification in the context of metaverse auditing, leveraging blockchain technology. With the rapid evolution of virtual environments and the emergence of the metaverse, ensuring trust, transparency, and security becomes paramount. Traditional centralized identity verification systems face challenges in such decentralized and dynamic environments. Blockchain technology offers promising solutions by providing a transparent, immutable, and decentralized ledger for identity management and verification. Conceptual Analysis research methodology used in this research paper because theoretical and conceptual clarity are crucial for understanding complex phenomena. The paper begins by exploring the concept of decentralized identity management systems and their significance in virtual environments. It discusses various challenges associated with traditional identity verification methods and highlights the potential of blockchain-based solutions in addressing these challenges. Through a systematic literature review, the paper examines existing research and developments in decentralized identity verification, metaverse auditing, and blockchain technology. Key topics covered include the architecture of decentralized identity systems, consensus mechanisms for identity verification on blockchain networks, privacy-preserving techniques, and interoperability standards for cross-platform identity management. Furthermore, the paper investigates the role of smart contracts and decentralized applications (DApps) in facilitating identity verification processes within the metaverse. The review also discusses the potential implications of decentralized identity verification in enhancing trust and security in virtual economies, enabling seamless user experiences, and fostering innovation in digital asset management. Moreover, it identifies current gaps and challenges in the field and proposes future research directions to address these issues. Overall, this research paper contributes to the understanding of decentralized identity verification in metaverse auditing using blockchain technology. It serves as a valuable resource for researchers, practitioners, and policymakers interested in exploring the intersection of decentralized identity, virtual environments, and blockchain technology. The insights provided aim to stimulate further research and innovation in this rapidly evolving domain.
APA, Harvard, Vancouver, ISO, and other styles
5

Researcher. "ADVANCEMENTS IN DECENTRALIZED IDENTITY SOLUTIONS: EMPOWERING USERS THROUGH SELF-SOVEREIGN IDENTITY." International Journal of Computer Engineering and Technology (IJCET) 15, no. 4 (2024): 721–33. https://doi.org/10.5281/zenodo.13374083.

Full text
Abstract:
This article explores the emerging field of decentralized identity solutions, with a focus on self-sovereign identity (SSI) as a transformative approach to digital identity management. It examines the limitations of traditional centralized systems and highlights how decentralized frameworks address these issues by empowering users with control over their personal data. The article discusses key components of SSI, including Decentralized Identifiers (DIDs) and Verifiable Credentials, and explores the potential benefits of these systems in enhancing privacy, security, efficiency, and inclusivity. Additionally, it analyzes the challenges facing widespread adoption, such as standardization, scalability, user experience, and regulatory compliance, while considering ongoing research efforts and future directions in this rapidly evolving domain.
APA, Harvard, Vancouver, ISO, and other styles
6

Journal, of Global Research in Multidisciplinary Studies(JGRMS). "Blockchain for Secure Identity Management: A Review on Decentralized Authentication Systems." Journal of Global Research in Multidisciplinary Studies(JGRMS) 01, no. 02 (2025): 01–06. https://doi.org/10.5281/zenodo.15245191.

Full text
Abstract:
The rise of blockchain technology has revolutionized identity management by introducing decentralized, secure, and user-centric systems. The capacity of blockchain-based identity management solutions to circumvent the drawbacks of conventional centralized approaches is the primary emphasis of this analysis. Here, we take a look at several important ideas like decentralized trustworthy identity (DTI) and self-sovereign identity (SSI), and we see how they improve privacy and security while giving users more powers over their own data. The paper also analyzes the role of cryptographic protocols, verifiable credentials, and decentralized identifiers (DIDs) in strengthening authentication processes. Despite its promise, blockchain-based identity management faces challenges, including scalability, privacy concerns, regulatory compliance, and system complexity. The purpose of this review is to offer a thorough overview of the present state of decentralized identity management by discussing the many approaches, problems, and potential avenues for further study in this area.
APA, Harvard, Vancouver, ISO, and other styles
7

Li, Jingxuan, and Yue Jing. "Establishing an International Engagement Model of Digital Identity Based on Blockchain." Mobile Information Systems 2022 (August 30, 2022): 1–7. http://dx.doi.org/10.1155/2022/6988211.

Full text
Abstract:
Blockchain technology has been changing the trust system through machine endorsement and mathematical algorithms, laying a technical foundation for network identity from centralized to decentralized management. The decentralized identity with core features, such as “no need for a management center and self-managed identities” have become a key direction for the evolution of a new generation of digital identity based on blockchain. Internationally, the United States, the EU, and other countries have promoted the technological exploration and application innovation of the decentralized identity, aiming to seize the international discourse power in the digital space. This paper establishes an evaluation model of international engagement in the decentralized identity field and takes the United States as a case to analyze the current development status and international engagement of the decentralized identity from multiple dimensions. Furthermore, it proposes some suggestions for other countries to improve the international engagement in the decentralized identity field.
APA, Harvard, Vancouver, ISO, and other styles
8

Kang Woo Cho, Mi Hyeon Jeon, and Sang Uk Shin. "Hierarchical Sovereignty Management and Access Control based on Self-Sovereign Identity." Research Briefs on Information and Communication Technology Evolution 7 (December 15, 2021): 215–21. http://dx.doi.org/10.56801/rebicte.v7i.131.

Full text
Abstract:
Self-sovereign identity is a type of decentralized identity technology and has been proposed to solvevarious problems of the existing public key infrastructure based centralized identity authenticationservice. In addition, the demand for a secure decentralized access control management (ACM)technique has increased according to the demand for such next-generation identity identificationservice. Accordingly, although various ACM techniques that can be applied to decentralized serviceshave been proposed, most fall into the introductory stage of research. In this paper, based on theSOVRIN-based restructured verifiable credential concept proposed in our previous study, we providea hierarchical sovereignty and ACM technique that does not use a smart contract.
APA, Harvard, Vancouver, ISO, and other styles
9

Deng, Xudong, Chengliang Tian, Fei Chen, and Hequn Xian. "Designated-Verifier Anonymous Credential for Identity Management in Decentralized Systems." Mobile Information Systems 2021 (September 9, 2021): 1–15. http://dx.doi.org/10.1155/2021/2807395.

Full text
Abstract:
Most of the existing identity management is the centralized architecture that has to validate, certify, and manage identity in a centralized approach by trusted authorities. Decentralized identity is causing widespread public concern because it enables to give back control of identity to clients, and the client then has the ability to control when, where, and with whom they share their credentials. A decentralized solution atop on blockchain will bypass the centralized architecture and address the single point of the failure problem. To our knowledge, blockchain is an inherited pseudonym but it cannot achieve anonymity and auditability directly. In this paper, we approach the problem of decentralized identity management starting from the designated-verifier anonymous credential (DVAC in short). DVAC would assist to build a new practical decentralized identity management with anonymity and auditability. Apart from the advantages of the conventional anonymous credential, the main advantage of the proposed DVAC atop blockchain is that the issued cryptographic token will be divided into shares at the issue phase and will be combined at the showing credential phase. Further, the smooth projective hash function ( SPHF in short) is regarded as a designated-verifier zero-knowledge proof system. Thus, we introduce the SPHF to achieve the designated verifiability without compromising the privacy of clients. Finally, the security of the proposed DVAC is proved along with theoretical and experimental evaluations.
APA, Harvard, Vancouver, ISO, and other styles
10

Prosper Onagie Yusuf, Abdullahi Mai-Auduga, Samuel Omokhafe Yusuf, Emmanuel Joshua, and Caleb Eshikpemi Yusuf. "A decentralized privacy-preserving and scalable blockchain-based identity management system." International Journal of Science and Research Archive 14, no. 2 (2025): 511–26. https://doi.org/10.30574/ijsra.2025.14.2.0368.

Full text
Abstract:
This project proposes a decentralized Identity Management System (IMS) built on blockchain technology, prioritizing user privacy and security. The system enables individuals to create, manage, and share their digital identities securely, leveraging blockchain’s immutability and transparency. By utilizing smart contracts, the IMS ensures identity verification and authentication while maintaining user control and consent. This innovative approach addresses, current identity management challenges, promoting a secure and decentralized digital identity ecosystem. The project’s outcome has far-reaching implications for various sectors where identity management is critical.
APA, Harvard, Vancouver, ISO, and other styles
11

Rodionov, Andrey. "The Potential of Blockchain Technology for Creating Decentralized Identity Systems: Technical Capabilities and Legal Regulation." International Journal of Law and Policy 2, no. 4 (2024): 19–30. http://dx.doi.org/10.59022/ijlp.170.

Full text
Abstract:
Decentralized identity systems based on blockchain technology have emerged as a promising solution to the limitations and challenges of traditional centralized identity management. This research explores the potential of blockchain for creating secure, transparent, and user-centric identity systems, focusing on the technical capabilities and legal implications. Through a comprehensive literature review and expert interviews, the study examines the core components of decentralized identity, such as self-sovereign identity and verifiable credentials, and compares them with centralized approaches. The research highlights the benefits of decentralized identity, including enhanced privacy, user control, and efficiency, while also identifying the regulatory gaps and proposing ways to address them. The study concludes that the successful implementation of decentralized identity systems requires a collaborative effort among stakeholders, considering both technical and legal aspects. The findings contribute to the advancement of knowledge in the field of identity management and provide practical recommendations for organizations seeking to adopt decentralized identity solutions.
APA, Harvard, Vancouver, ISO, and other styles
12

Polychronaki, Maria, Michael G. Xevgenis, Dimitrios G. Kogias, and Hellen C. Leligou. "Decentralized Identity Management for Metaverse-Enhanced Education: A Literature Review." Electronics 13, no. 19 (2024): 3887. http://dx.doi.org/10.3390/electronics13193887.

Full text
Abstract:
As we transition into the era of Web 3.0, where decentralized information and user privacy are paramount, emerging technologies are reshaping the way in which personal data are managed. This paper focuses on decentralized identity management (DID) in the metaverse, particularly within the education sector, which has rapidly embraced digital tools for e-learning, especially since the COVID-19 pandemic. Technologies such as blockchain, artificial intelligence (AI), and virtual and augmented reality (VR/AR) are increasingly integrated into educational platforms, raising questions about privacy, security, and interoperability. This literature review examines the current landscape of DID in metaverse-based educational applications. Through a systematic methodology, relevant academic papers were identified, filtered, and analyzed based on four key criteria: standardization, interoperability, application scalability, and security/privacy considerations. The paper provides a comparative analysis of these papers to assess the maturity of DID implementations, highlight existing challenges, and suggest future research directions in the intersection of decentralized identity and educational metaverse applications.
APA, Harvard, Vancouver, ISO, and other styles
13

Zhang, Chiyu, and Inseok Hwang. "Multi-target identity management with decentralized optimal sensor scheduling." European Journal of Control 56 (November 2020): 10–37. http://dx.doi.org/10.1016/j.ejcon.2020.01.004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

A, MR A. MURUGAVEL. "Decentralized Identity Management in Cross-Social Network Photo Sharing." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem30036.

Full text
Abstract:
The widespread use of online social networks has resulted in a surge in photo sharing, but the vulnerability of photo privacy becomes apparent when these images are disseminated across multiple platforms. Current solutions often fall short in delivering efficient social network services without compromising user privacy. Introducing PhotoChain, a revolutionary blockchain-based framework designed to facilitate secure photo sharing across social networks. This framework incorporates advanced features, including dissemination control, face masking, photo integrity verification, access control, and dynamic privacy policy generation. Leveraging smart contracts, PhotoChain ensures a consistent consensus on dissemination control, while robust mechanisms for photo ownership identification are integrated to thwart illegal reprinting. A fully functional prototype has been implemented and rigorously tested, substantiating the framework's prowess in delivering security, efficacy, and efficiency for photo sharing across social networks. Keywords: Online social networks, PhotoChain, blockchain
APA, Harvard, Vancouver, ISO, and other styles
15

Akpe, Oyinomomo-emi Emmanuel, Denis Kisina, Samuel Owoade, Abel Chukwuemeke Uzoka, right Chibunna Ubanadu, and Andrew Ifesinachi Daraojimba. "Advances in Federated Authentication and Identity Management for Scalable Digital Platforms." Journal of Frontiers in Multidisciplinary Research 2, no. 1 (2021): 87–93. https://doi.org/10.54660/.ijfmr.2021.2.1.87-93.

Full text
Abstract:
The increasing complexity of digital platforms, driven by cloud-native architectures, distributed applications, and user-centric services, necessitates robust, scalable, and secure identity management frameworks. This paper explores recent advances in federated authentication and identity management, emphasizing their role in enabling seamless and secure access across interconnected digital ecosystems. Beginning with a foundational overview of identity management’s evolution—from traditional siloed systems to federated and decentralized models—the study outlines key technologies such as SAML, OAuth, OpenID Connect, and emerging paradigms like decentralized identity and blockchain-based verification. It further investigates the integration of artificial intelligence and machine learning for adaptive authentication, anomaly detection, and risk-based decision-making, alongside privacy-enhancing technologies ensuring compliance with data protection regulations such as GDPR. Through the examination of scalability, interoperability, and security challenges, the paper identifies best practices and architectural strategies critical for real-world implementations. The discussion culminates in practical implications for industry adoption across sectors such as healthcare, finance, and e-commerce, and highlights future research directions including the development of standardized identity frameworks, AI integration, and decentralized identity systems in multi-cloud and edge computing environments. This study offers a comprehensive synthesis of current trends and technologies that are shaping the next generation of identity management in scalable digital platforms.
APA, Harvard, Vancouver, ISO, and other styles
16

Alamri, Bandar, Katie Crowley, and Ita Richardson. "Cybersecurity Risk Management Framework for Blockchain Identity Management Systems in Health IoT." Sensors 23, no. 1 (2022): 218. http://dx.doi.org/10.3390/s23010218.

Full text
Abstract:
Blockchain (BC) has recently paved the way for developing Decentralized Identity Management (IdM) systems for different information systems. Researchers widely use it to develop decentralized IdM systems for the Health Internet of Things (HIoT). HIoT is considered a vulnerable system that produces and processes sensitive data. BC-based IdM systems have the potential to be more secure and privacy-aware than centralized IdM systems. However, many studies have shown potential security risks to using BC. A Systematic Literature Review (SLR) conducted by the authors on BC-based IdM systems in HIoT systems showed a lack of comprehensive security and risk management frameworks for BC-based IdM systems in HIoT. Conducting a further SLR focusing on risk management and supplemented by Grey Literature (GL), in this paper, a security taxonomy, security framework, and cybersecurity risk management framework for the HIoT BC-IdM systems are identified and proposed. The cybersecurity risk management framework will significantly assist developers, researchers, and organizations in developing a secure BC-based IdM to ensure HIoT users’ data privacy and security.
APA, Harvard, Vancouver, ISO, and other styles
17

Maidine, Khalid, Ahmed EL-Yahyaoui, and Salima Trichni. "Quantum-Resistant Identity Management via ZK-STARKs and Decentralized Storage." Ingénierie des systèmes d information 30, no. 5 (2025): 1297–311. https://doi.org/10.18280/isi.300516.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Bhaskara Garnimitta. "Blockchain-Enabled Decentralized Identity Management: A Novel Framework for Microservices Architecture." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 1 (2025): 1929–36. https://doi.org/10.32628/cseit251112209.

Full text
Abstract:
This article presents a novel framework for implementing decentralized identity management in microservices architecture using blockchain technology. The proposed solution addresses the inherent challenges of traditional centralized identity management systems by leveraging distributed ledger technology and smart contracts to create a secure, transparent, and user-centric authentication mechanism. The framework incorporates comprehensive privacy controls and consent management features while ensuring compliance with regulatory requirements across various industries. Through extensive evaluation across multiple use cases in healthcare, financial services, and government sectors, the results demonstrate enhanced security, improved scalability, and better user privacy control compared to conventional approaches. The article suggests that blockchain-based identity management can significantly reduce the risk of security breaches while providing a more robust and flexible authentication mechanism for modern distributed systems. This article contributes to the growing body of knowledge in distributed systems security and provides practical insights for organizations looking to implement decentralized identity management solutions.
APA, Harvard, Vancouver, ISO, and other styles
19

Liu, Yuhao. "A Framework for Decentralized Identity and Credential Management Leveraging Blockchain Technology." Advances in Economics, Management and Political Sciences 103, no. 1 (2024): 108–20. http://dx.doi.org/10.54254/2754-1169/103/20242354.

Full text
Abstract:
Abstract: As internet technology rapidly advances and the infrastructure continues to evolve, web applications have become an integral part of our daily lives, with electronic identities (e-identities) playing a crucial role. Today, e-identities are vital for verifying personal identity in numerous online activities, and as our dependence on them grows, so does the concern for their security. This increasing importance of e-identity security raises various challenges, highlighting the need for robust solutions. In response to these challenges, this article introduces a novel solution: a blockchain-based decentralized identity and credential management framework. This approach not only enhances security but also offers greater control and flexibility for users. The article delves into the intricacies of the framework, detailing its design and operational mechanism. Additionally, it explores a range of practical applications, demonstrating the framework's versatility and effectiveness through diverse case studies. This comprehensive examination underscores the framework's potential to revolutionize e-identity management and addresses the pressing need for secure and efficient online identity verification in our increasingly digital world.
APA, Harvard, Vancouver, ISO, and other styles
20

Javed, Ibrahim Tariq, Fares Alharbi, Badr Bellaj, Tiziana Margaria, Noel Crespi, and Kashif Naseer Qureshi. "Health-ID: A Blockchain-Based Decentralized Identity Management for Remote Healthcare." Healthcare 9, no. 6 (2021): 712. http://dx.doi.org/10.3390/healthcare9060712.

Full text
Abstract:
COVID-19 has made eHealth an imperative. The pandemic has been a true catalyst for remote eHealth solutions such as teleHealth. Telehealth facilitates care, diagnoses, and treatment remotely, making them more efficient, accessible, and economical. However, they have a centralized identity management system that restricts the interoperability of patient and healthcare provider identification. Thus, creating silos of users that are unable to authenticate themselves beyond their eHealth application’s domain. Furthermore, the consumers of remote eHealth applications are forced to trust their service providers completely. They cannot check whether their eHealth service providers adhere to the regulations to ensure the security and privacy of their identity information. Therefore, we present a blockchain-based decentralized identity management system that allows patients and healthcare providers to identify and authenticate themselves transparently and securely across different eHealth domains. Patients and healthcare providers are uniquely identified by their health identifiers (healthIDs). The identity attributes are attested by a healthcare regulator, indexed on the blockchain, and stored by the identity owner. We implemented smart contracts on an Ethereum consortium blockchain to facilities identification and authentication procedures. We further analyze the performance using different metrics, including transaction gas cost, transaction per second, number of blocks lost, and block propagation time. Parameters including block-time, gas-limit, and sealers are adjusted to achieve the optimal performance of our consortium blockchain.
APA, Harvard, Vancouver, ISO, and other styles
21

Papatheodorou, Nikos, George Hatzivasilis, and Nikos Papadakis. "The YouGovern Secure Blockchain-Based Self-Sovereign Identity (SSI) Management and Access Control." Applied Sciences 15, no. 12 (2025): 6437. https://doi.org/10.3390/app15126437.

Full text
Abstract:
Self-sovereign identity (SSI) is an emerging model for digital identity management that empowers individuals to control their credentials without reliance on centralized authorities. This work presents YouGovern, a blockchain-based SSI system deployed on Binance Smart Chain (BSC) and compliant with W3C Decentralized Identifier (DID) standards. The architecture includes smart contracts for access control, decentralized storage using the Inter Planetary File System (IPFS), and long-term persistence via Web3.Storage. YouGovern enables users to register, share, and revoke identities while preserving privacy and auditability. The system supports role-based permissions, verifiable claims, and cryptographic key rotation. Performance was evaluated using Ganache and Hardhat under controlled stress tests, measuring transaction latency, throughput, and gas efficiency. Results indicate an average DID registration latency of 0.94 s and a peak throughput of 12.5 transactions per second. Compared to existing SSI systems like Sovrin and uPort, YouGovern offers improved revocation handling, lower operational costs, and seamless integration with decentralized storage. The system is designed for portability and real-world deployment in academic, municipal, or governmental settings.
APA, Harvard, Vancouver, ISO, and other styles
22

Shetye, Gauri, Nandini Sonar, and Dr Dhanamma Jagli. "Blockchain-based Self-sovereign Identity Management System." International Journal for Research in Applied Science and Engineering Technology 10, no. 6 (2022): 2128–31. http://dx.doi.org/10.22214/ijraset.2022.44335.

Full text
Abstract:
Abstract - The whole concept of self-sovereign identity (SSI) is gaining a lot of optimism, with the emerging Blockchain Technology in the current tech-scenario. It is a major change in how online interactions will take place in the future considering the identity of each user. The different aspects of SSI are examined by various works in the literature This paper surveys the origin of identity, various digital identity models and how it leads to self-sovereign identity. It then goes on to discuss related research, as well as the SSI's building blocks, which include decentralized IDs, verifiable credentials, a distributed ledger, and a variety of privacy mechanisms. Finally, it proposes a solution for self-sovereign identity by using the Ethereum platform for blockchain and other technologies
APA, Harvard, Vancouver, ISO, and other styles
23

Rai, Bipin Kumar, Pranjal Sharma, Sagar Singhal, and Basavaraj S. Paruti. "Decentralized Blockchain-Enabled Employee Authentication System." International Journal of Reliable and Quality E-Healthcare 12, no. 1 (2023): 1–13. http://dx.doi.org/10.4018/ijrqeh.323570.

Full text
Abstract:
In recent years, there have been many attempts to introduce blockchain-based identity management solutions, which allow the user to take over control of his/her own identity. In this paper, the authors have reviewed in-depth existing blockchain-based identity management papers and patents published online. Based on that analysis of the literature, a system will be implemented which will come up with the current issues and try to minimize them. Being transparent, immutable, and decentralized in nature, blockchain mechanism is found to be a better technology which can reduce the corruption in the experimental scenario. The objective is to develop a decentralized system which can be used for the verification of the employees in an organization. This is done to stop or reduce the cases of identity theft and data leakage in recent time. This system will be using Ethereum blockchain platform for monitoring the information and smart contract for authentication.
APA, Harvard, Vancouver, ISO, and other styles
24

Jia, Xudong, Ning Hu, Shi Yin, Yan Zhao, Chi Zhang, and Xinda Cheng. "A2 Chain: A Blockchain-Based Decentralized Authentication Scheme for 5G-Enabled IoT." Mobile Information Systems 2020 (December 21, 2020): 1–19. http://dx.doi.org/10.1155/2020/8889192.

Full text
Abstract:
The fifth-generation mobile communication technology (5G) provides high-bandwidth and low-latency data channels for massive IoT terminals to access the core business network. At the same time, it also brings higher security threats and challenges. Terminal identity authentication is an important security mechanism to ensure the core business network; however, most of the existing solutions adopt a centralized authentication model. Once the number of authentication requests exceeds the processing capacity of the authentication center service, it will cause authentication request congestion or deadlock. The decentralized authentication model can effectively solve the above problems. This article proposes a decentralized IoT authentication scheme called A2 Chain. First, A2 Chain uses edge computing to decentralize the processing of authentication requests and eliminate the burden on authentication services and the network. Second, to implement cross-domain identity verification of IoT devices, A2 Chain uses blockchain, and sidechain technologies are used to securely share the identity verification information of IoT devices. Additionally, A2 Chain replaces public key infrastructure (PKI) algorithm with identity-based cryptography (IBC) algorithm to eliminate the management overhead caused by centralized authentication model.
APA, Harvard, Vancouver, ISO, and other styles
25

Ranga, Premsai. "Blockchain Technology in Identity Management: Enhancing Cybersecurity Frameworks." International Journal of Innovative Research in Engineering & Multidisciplinary Physical Sciences 11, no. 6 (2023): 1–16. https://doi.org/10.5281/zenodo.14280061.

Full text
Abstract:
Identity management is a critical component of cybersecurity, ensuring that only authorized individuals can access sensitive systems and data. Traditional identity management systems, which rely on centralized databases, face growing challenges related to data breaches, unauthorized access, and identity theft. Blockchain technology, with its decentralized, transparent, and tamper-resistant nature, has emerged as a promising solution to enhance identity management frameworks and improve overall cybersecurity.This paper proposes a novel identity management framework leveraging blockchain technology to address the limitations of conventional systems. The proposed system utilizes blockchain's immutable ledger to securely store and verify digital identities, eliminating the need for centralized databases and mitigating the risk of data breaches and identity fraud.Zero-knowledge Self-sovereign identities (SSI) cryptography a key feature of blockchain, empowers individuals to control and manage their own identity data, granting them the ability to selectively share information with trusted entities without relying on intermediaries. The novelty of this approach lies in the integration of blockchain's smart contracts for automated, conditional access control and cryptographic techniques to ensure user privacy and security. By combining these technologies, the system enables the dynamic issuance of identity verifications, such as multi-factor authentication (MFA) tokens, on-demand, reducing reliance on static credentials and enhancing resistance to phishing and credential theft. This decentralized model not only improves security but also enhances user experience by providing a unified and simplified approach to digital identity management. Through extensive analysis, the paper demonstrates how the adoption of blockchain in identity management can significantly reduce cybersecurity risks, such as unauthorized access, data breaches, and identity theft. The proposed framework promises to redefine digital identity management by providing a more secure, private, and user-centric model, which is essential in the evolving landscape of cybersecurity.
APA, Harvard, Vancouver, ISO, and other styles
26

Olanrewaju, Oluwaseun Ajayi, Elizabeth Alozie Chisom, and Anthony Abieba Olumese. "Blockchain's Transformative Potential in Securing Digital Identities and Personal Data." Engineering and Technology Journal 10, no. 02 (2025): 3798–804. https://doi.org/10.5281/zenodo.14849845.

Full text
Abstract:
This review paper explores the transformative potential of blockchain technology in securing digital identities and personal data. It examines various blockchain applications, including identity verification, self-sovereign identity, and decentralized authentication mechanisms. Despite scalability issues, interoperability concerns, and regulatory hurdles, ongoing developments promise to overcome these obstacles. Future directions in blockchain technology include scalability solutions, interoperability standards, and privacy-enhancing technologies. Additionally, integration with AI and machine learning presents opportunities for enhancing identity verification processes. Collaboration between industry stakeholders and policymakers is crucial for shaping regulatory frameworks that promote innovation while safeguarding privacy rights. Overall, blockchain technology offers a decentralized and transparent approach to digital identity management and personal data security, with significant implications for empowering individuals and enhancing trust in the digital ecosystem.
APA, Harvard, Vancouver, ISO, and other styles
27

Vasuki, M. "The Impact of Blockchain on Digital Identity Management." International Journal for Research in Applied Science and Engineering Technology 11, no. 7 (2023): 290–94. http://dx.doi.org/10.22214/ijraset.2023.54616.

Full text
Abstract:
Abstract: This journal explores the profound influence of blockchain technology on the realm of digital identity management. As traditional identity systems face significant challenges in terms of security, privacy, and interoperability, blockchain emerges as a promising solution with its decentralized and immutable nature. This paper delves into the key aspects of blockchain technology that contribute to enhancing digital identity management, including decentralization, transparency, security, privacy, and interoperability. The potential benefits and challenges of implementing blockchain-based identity solutions are discussed, along with notable use cases and ongoing initiatives. Ultimately, this journal aims to provide a comprehensive understanding of how blockchain is transforming digital identity management and shaping the future of trusted online interactions.
APA, Harvard, Vancouver, ISO, and other styles
28

Hardjono, Thomas. "Federated Authorization over Access to Personal Data for Decentralized Identity Management." IEEE Communications Standards Magazine 3, no. 4 (2019): 32–38. http://dx.doi.org/10.1109/mcomstd.001.1900019.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Dib, Omar, and Khalifa Toumi. "Decentralized Identity Systems: Architecture, Challenges, Solutions and Future Directions." Annals of Emerging Technologies in Computing 4, no. 5 (2020): 19–40. http://dx.doi.org/10.33166/aetic.2020.05.002.

Full text
Abstract:
Due to the exponential rise of the Internet in the last two decades, the digital presence has seen an enormous increase. Today, billions of people, devices and objects are digitally connected making the interactions much easier than before. To securely establish this connectivity in the digital era, proving digital identities has become crucial. Due to this, a growing number of organizations are building solutions that establish, verify and manage digital identities. Yet, a solution whereby digital identities and their associated data are efficiently managed is still far from being achieved. To fully understand the reason behind this lack, this paper provides a detailed state of the art related to identity management systems. It overviews traditional systems, analyses their strengths and limitations. This work highly focuses on the novel decentralized identity systems based on blockchain; a complete study describing their architecture, components, lifecycle and workflow is detailed. Additionally, solutions enabling decentralized identity are discussed, analysed and compared according to the ten principles of self-sovereign identity. Lastly, the challenges hindering the shift toward the fully decentralized identity paradigm are discussed.
APA, Harvard, Vancouver, ISO, and other styles
30

Gregory, H. Jackson, and Taiuru Karaitiana. "MECHANISMS FOR DIGITAL TRANSFORMATION IN THE EDUCATION AND HEALTHCARE SECTORS UTILIZING DECENTRALIZED SELF-SOVEREIGN IDENTITY." International Journal of Network Security & Its Applications (IJNSA) 15, no. 2 (2023): 01–21. https://doi.org/10.5281/zenodo.7800411.

Full text
Abstract:
This paper argues for the consideration of a decentralized, open, interoperable identity framework as a secure, scalable, user-centered meta-platform capable of leveraging many aggregate network advantages and delivery options for education and healthcare providers. An overview of the shortfalls and vulnerabilities of the current Internet and systems for identity management is first explained, followed by a summary of the status of development and primary proponents of decentralized, blockchain-enabled, self-sovereign identification (SSI). An examination of the Key Event Receipt Infrastructure (KERI) open-source decentralized key management infrastructure (DKMI) and its primary root-of-trust in self-certifying identifiers (SCID) is evaluated. This paper recommends KERI for consideration as a potential meta-platform overlay and solution for both the education and health industries as a means of attaining their primary goal of being more user versus institution-centric in their core interactions and processes. Finally, some pathways for future research are recommended.
APA, Harvard, Vancouver, ISO, and other styles
31

Bhattad, Bharti, and Arpit Gupta. "Blockchain Based Supply Management System." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem44465.

Full text
Abstract:
The emergence of supply management systems revolutionized global data exchange, providing a broader platform for sharing information, personal data and digital goods but despite its many advantages, the use of supply management systems is a burden a host of data governance and privacy challenges , a growing number of platforms involved in data theft, susceptibility to data breaches, susceptibility to identity theft, and the spread of fake news are often involved in extensive data management to facilitate targeted advertising and increase profitability. In response to these challenges, our proposal is to integrate blockchain technology to create decentralized platforms. This decentralized move towards data governance not only promises greater control over personal data but also ensures transparency, security, and control over data governance. Keywords—Decentralization, Data Privacy, Data Management, Misinformation, Data Monitoring, Data Piracy, Data Breaches, Identity Theft, False Information, Surveillance, Transparency, Security, User Empowerment, supply management
APA, Harvard, Vancouver, ISO, and other styles
32

Jackson, Gregory H., and Karaitiana Taiuru. "Mechanisms for Digital Transformation in the Education and Healthcare Sectors Utilizing Decentralized Self-Sovereign Identity." International Journal of Network Security & Its Applications 15, no. 2 (2023): 1–21. http://dx.doi.org/10.5121/ijnsa.2023.15201.

Full text
Abstract:
This paper argues for the consideration of a decentralized, open, interoperable identity framework as a secure, scalable, user-centered meta-platform capable of leveraging many aggregate network advantages and delivery options for education and healthcare providers. An overview of the shortfalls and vulnerabilities of the current Internet and systems for identity management is first explained, followed by a summary of the status of development and primary proponents of decentralized, blockchain-enabled, selfsovereign identification (SSI). An examination of the Key Event Receipt Infrastructure (KERI) open-source decentralized key management infrastructure (DKMI) and its primary root-of-trust in self-certifying identifiers (SCID) is evaluated. This paper recommends KERI for consideration as a potential metaplatform overlay and solution for both the education and health industries as a means of attaining their primary goal of being more user versus institution-centric in their core interactions and processes. Finally, some pathways for future research are recommended.
APA, Harvard, Vancouver, ISO, and other styles
33

Sadique, Kazi Masum, Rahim Rahmani, and Paul Johannesson. "DIdM-EIoTD: Distributed Identity Management for Edge Internet of Things (IoT) Devices." Sensors 23, no. 8 (2023): 4046. http://dx.doi.org/10.3390/s23084046.

Full text
Abstract:
The Internet of Things (IoT) paradigm aims to enhance human society and living standards with the vast deployment of smart and autonomous devices, which requires seamless collaboration. The number of connected devices increases daily, introducing identity management requirements for edge IoT devices. Due to IoT devices’ heterogeneity and resource-constrained configuration, traditional identity management systems are not feasible. As a result, identity management for IoT devices is still an open issue. Distributed Ledger Technology (DLT) and blockchain-based security solutions are becoming popular in different application domains. This paper presents a novel DLT-based distributed identity management architecture for edge IoT devices. The model can be adapted with any IoT solution for secure and trustworthy communication between devices. We have comprehensively reviewed popular consensus mechanisms used in DLT implementations and their connection to IoT research, specifically identity management for Edge IoT devices. Our proposed location-based identity management model is generic, distributed, and decentralized. The proposed model is verified using the Scyther formal verification tool for security performance measurement. SPIN model checker is employed for different state verification of our proposed model. The open-source simulation tool FobSim is used for fog and edge/user layer DTL deployment performance analysis. The results and discussion section represents how our proposed decentralized identity management solution should enhance user data privacy and secure and trustworthy communication in IoT.
APA, Harvard, Vancouver, ISO, and other styles
34

Kshitij Varshney. "Digital Identity Management Using Biometric Systems: BioTrace." Journal of Information Systems Engineering and Management 10, no. 51s (2025): 374–85. https://doi.org/10.52783/jisem.v10i51s.10396.

Full text
Abstract:
In an increasingly digital world, establishing secure and reliable methods for verifying identity has become a critical priority across sectors such as finance, healthcare, education, and e-governance. Traditional authentication mechanisms—relying on passwords, personal identification numbers, and physical documents—are increasingly susceptible to fraud, data breaches, and user inconvenience. This paper presents a multi-modal biometric framework for digital identity management, integrating facial recognition and fingerprint verification to enhance accuracy, reduce fraud, and ensure user-centric security. The proposed system includes modules for data acquisition, preprocessing, feature extraction using Convolutional Neural Networks (CNNs) and minutiae detection, score-level fusion, and final authentication decisions. Security and privacy are ensured through AES-256 encryption, differential privacy techniques, and decentralized blockchain-based data storage. This research contributes a scalable, privacy-aware, and highly accurate digital identity model capable of addressing challenges such as interoperability, user trust, and regulatory compliance. Future enhancements include the integration of additional biometric modalities and deployment in mobile and IoT environments.
APA, Harvard, Vancouver, ISO, and other styles
35

Ramírez-Gordillo, Tamai, Antonio Maciá-Lillo, Francisco A. Pujol, Nahuel García-D’Urso, Jorge Azorín-López, and Higinio Mora. "Decentralized Identity Management for Internet of Things (IoT) Devices Using IOTA Blockchain Technology." Future Internet 17, no. 1 (2025): 49. https://doi.org/10.3390/fi17010049.

Full text
Abstract:
The exponential growth of the Internet of Things (IoT) necessitates robust, scalable, and secure identity management solutions to handle the vast number of interconnected devices. Traditional centralized identity systems are increasingly inadequate due to their vulnerabilities, such as single points of failure, scalability issues, and limited user control over data. This study explores a decentralized identity management model leveraging the IOTA Tangle, a Directed Acyclic Graph (DAG)-based distributed ledger technology, to address these challenges. By integrating Decentralized Identifiers (DIDs), Verifiable Credentials (VCs), and IOTA-specific technologies like IOTA Identity, IOTA Streams, and IOTA Stronghold, we propose a proof-of-concept framework that enhances security, scalability, and privacy in IoT ecosystems. Our implementation on resource-constrained IoT devices demonstrates the feasibility of this approach, highlighting significant improvements in transaction efficiency, real-time data exchange, and cryptographic key management. Furthermore, this research aligns with Web 3.0 principles, emphasizing decentralization, user autonomy, and data sovereignty. The findings suggest that IOTA-based solutions can effectively advance secure and user-centric identity management in IoT, paving the way for broader applications in various domains, including smart cities and healthcare.
APA, Harvard, Vancouver, ISO, and other styles
36

Shailaja Lohar. "Decentralization of Identity using Ethereum and IPFS." Communications on Applied Nonlinear Analysis 31, no. 4s (2024): 378–91. http://dx.doi.org/10.52783/cana.v31.917.

Full text
Abstract:
Introduction: The Identity of a user in digital world is an important factor for an individual. Identity management has been handled by various models which, over the period of time have been prone various security breaches. The foremost integral part of any identity model is the centralized storage, access of data. Considering this, in recent years, there has been evolution from centralization to de-centralization of Identity management. With respect to this new aspect, this paper proposes a solution to the centralized management problems, as a decentralized Identity Management System. The said approach utilizes Ethereum blockchain, IPFS, both supporting distributed data accessibility and data storage respectively. This paper also sheds light on the W3C specification of DID (De-centralized Identifier) which supports the Self-Sovereign Identity principles of Identity Management and are vital for de-centralization of Identity Management
APA, Harvard, Vancouver, ISO, and other styles
37

Sisodia, Kartik, and Garima Sharma. "Block Chain Based Identify Management for Secure & Decentralised Web Application." Radius: Journal of Science and Technology 2, no. 1 (2025): 251009. https://doi.org/10.5281/zenodo.15366215.

Full text
Abstract:
The research presents a blockchain-based identity management system for protecting decentralized web applications by operating through decentralized processes. Through its permissioned Ethereum network The-system enables automatic operations for identity lifecycle management to register authenticate authorize and revoke users while maintaining privacy of user data (anonymization and encryption of user data). Users receive hashed credentials which the blockchain ledger retains forever as secure storage alongside complete PII data privacy. Smart contracts determine access through comparison between incoming requests and permanent role statements stored on the blockchain network. Large attribute storage operates by connecting to Inter Planetary File System (IPFS) gateway servers that store blockchain reference data through content hash keys. Users accomplish authentication via a zero-knowledge proof module which enables attribute disclosure under zk‑SNARK’s parameters to reduce identity exposure. The consensus model deployed in the system supports execution of more than 5000 TPS transactions by completing them within sub-second periods. Performance evaluation confirms scalability, reliability, and real-time access control, demonstrating its viability for modern web applications requiring high throughput and low-latency operations. Security testing establishes that the network withstands Sybil attacks together with replay and man-in-the-middle attacks and privacy evaluation demonstrates unauthorized entities have no ability to derive user profiles. The evaluated benchmark results demonstrate that the framework's performance potential by testing 50 nodes in a test network locally. Research indicates that blockchain identity management develops an resistant system which has enormous potential capacity alongside privacy protection capabilities superior to conventional centralized identity management systems.
APA, Harvard, Vancouver, ISO, and other styles
38

Vinod, Veeramachaneni. "Decentralized Trust Management in Web 3.0: A Comprehensive Approach to Network Security." Recent Innovations in Wireless Network Security 7, no. 1 (2024): 9–26. https://doi.org/10.5281/zenodo.14161410.

Full text
Abstract:
<em>This paper investigates decentralized trust management as a foundational element of Web 3.0, emphasizing a secure, autonomous, and user-driven approach to online interactions without reliance on centralized authorities. We address key challenges in decentralized environments, including those in Decentralized Finance (DeFi), decentralized identity (DID) systems, and Web 3.0 governance models. Our proposed framework integrates blockchain, Proof of Stake (PoS) consensus, Decentralized Identifiers, Zero-Knowledge Proofs (ZKPs), and smart contracts to create a comprehensive, secure, and scalable trust management solution. This method addresses limitations observed in traditional frameworks like X.509 and PGP, which only cover isolated aspects of trust. The results from our approach demonstrate considerable improvements in transaction security, user privacy, and data autonomy, driven by enhanced policy formulation and validation mechanisms. Through a robust trust scoring system and self-executing smart contracts, our solution ensures effective and transparent trust management across diverse Web 3.0 applications. Experimental results indicate that our integrated approach significantly elevates security and efficiency, positioning it as a scalable model for the evolving needs of decentralized networks. This work provides a solid foundation for future Web 3.0 systems, offering a practical and resilient framework for managing trust in decentralized, user-centric ecosystems</em><em>.</em>
APA, Harvard, Vancouver, ISO, and other styles
39

Bhasker Reddy Ande. "AI-Driven Decentralized Identity Access Management: Leveraging Blockchain, DIDs, and Self-Sovereign Identity for Secure Authentication." Journal of Information Systems Engineering and Management 10, no. 35s (2025): 36–47. https://doi.org/10.52783/jisem.v10i35s.5920.

Full text
Abstract:
Victory of digital services has produced new problems for identity management and security systems operating within online networks. The authentication systems that operate from central locations have become more susceptible to privacy breaches in addition to experiencing rising data security risks. This research develops a new identity access management solution which integrates AI alongside Blockchain and DIDs alongside SSI technology to enhance user-controlled security elements. AMD-SSI technology unions enable end-users to govern their digital personae independently from any control efforts from centralizing entities. Through Blockchain implementation users can attain both security and transparency while DIDs and SSI enable them to securely control their authentication methods. The document examines how to build and implement such a decentralized IAM framework and investigates its operational benefits and possible implementation hurdles to guide digital authentication practices.
APA, Harvard, Vancouver, ISO, and other styles
40

Soltani, Reza, Uyen Trang Nguyen, and Aijun An. "A Survey of Self-Sovereign Identity Ecosystem." Security and Communication Networks 2021 (July 17, 2021): 1–26. http://dx.doi.org/10.1155/2021/8873429.

Full text
Abstract:
Self-sovereign identity is the next evolution of identity management models. This survey takes a journey through the origin of identity, defining digital identity and progressive iterations of digital identity models leading up to self-sovereign identity. It then states the relevant research initiatives, platforms, projects, and regulatory frameworks, as well as the building blocks including decentralized identifiers, verifiable credentials, distributed ledger, and various privacy engineering protocols. Finally, the survey provides an overview of the key challenges and research opportunities around self-sovereign identity.
APA, Harvard, Vancouver, ISO, and other styles
41

Alanzi, Haifa Mohammed, and Mohammad Alkhatib. "Blockchain-Based Identity Management System Prototype for Enhanced Privacy and Security." Electronics 14, no. 13 (2025): 2605. https://doi.org/10.3390/electronics14132605.

Full text
Abstract:
An Identity Management System (IDMS) is responsible for managing and organizing identities and credentials exchanged between users, Identity Providers (IDPs), and Service Providers (SPs). The primary goal of IDMS is to ensure the confidentiality and privacy of users’ personal data. Traditional IDMS relies on a third party to store user information and authenticate the user. However, this approach poses threats to user privacy and increases the risk of single point of failure (SPOF), user tracking, and data unavailability. In contrast, decentralized IDMSs that use blockchain technology offer potential solutions to these issues as they offer powerful features including immutability, transparency, anonymity, and decentralization. Despite its advantages, blockchain technology also suffers from limitations related to performance, third-party control, weak authentication, and data leakages. Furthermore, some blockchain-based IDMSs still exhibit centralization issues, which can compromise user privacy and create SPOF risks. This study proposes a decentralized IDMS that leverages blockchain and smart contract technologies to address the shortcomings of traditional IDMSs. The proposed system also utilizes the Interplanetary file system (IPFS) to enhance the scalability and performance by reducing the on-chain storage load. Additionally, the proposed IDMS employs the Elliptic Curve Integrated Encryption Scheme (ECIES) to provide an extra layer of security to protect users’ sensitive information while improving the performance of the systems’ transactions. Security analysis and experimental results demonstrated that the proposed IDMS offers significant security and performance advantages compared to its counterparts.
APA, Harvard, Vancouver, ISO, and other styles
42

Gahlawat, Monica. "Survey of Online Identity Management Techniques on Blockchain." International Journal of Security and Privacy in Pervasive Computing 12, no. 4 (2020): 19–28. http://dx.doi.org/10.4018/ijsppc.2020100102.

Full text
Abstract:
Secure identity management is one of the controversial topics in the cybersecurity landscape. The user needs to rely on third-party providers for managing their personal information, which is a big security concern. Traditional identity systems typically suffer from single points of failure, lack of interoperability, and privacy issues such as encouraging mass data collection and user tracking. Blockchain technology has the potential to support novel data ownership and governance models with built-in control and consent mechanisms, which may benefit both users and businesses by alleviating these concerns. Blockchain-based systems provide the possibility for their users to insert their data in this distributed ledger. Users can trust the blockchain as it is leveraging consensus mechanisms to validate and gather the transactions in immutable blocks. The transparent and decentralized nature of the blockchain network enables the development of a non-refutable and unbreakable record of data, which is the fundamental feature of many applications, such as identity management.
APA, Harvard, Vancouver, ISO, and other styles
43

Xu, Bowen, Zhijintong Zhang, Aozhuo Sun, et al. "T-FIM: Transparency in Federated Identity Management for Decentralized Trust and Forensics Investigation." Electronics 12, no. 17 (2023): 3591. http://dx.doi.org/10.3390/electronics12173591.

Full text
Abstract:
Federated Identity Management (FIM) has gained significant adoption as a means to simplify user authentication and service authorization across diverse domains. It serves as a centralized authentication and authorization method, enabling users to access various applications or resources using credentials issued by a universally trusted identity provider (IdP). However, recent security incidents indicate that the reliability of credentials issued by IdP is not absolute in practice. If the IdP fails, it can persistently access any application that trusts it as any user. This poses a significant security threat to the entire system. Furthermore, with the increasing adoption of FIM across diverse scenarios, there is a growing demand for the development of an identity management system that can effectively support digital forensics investigations into malicious user behavior. In this work, we introduce transparency to federated identity management, proposing T-FIM to supervise unconditional trust. T-FIM employs privacy-preserving logs to record all IdP-issued tokens, ensuring that only the true owner can access the exact token. We utilize identity-based encryption (IBE), but not just as a black box, encrypting tokens before they are publicly recorded. In addition, we propose a decentralized private key generator (DPKG) to provide IBE private keys for users, avoiding the introduction of a new centralized trust node. T-FIM also presents a novel approach to digital forensics that enables forensic investigators to collect evidence in a privacy-preserving manner with the cooperation of the DPKG. We conduct a comprehensive analysis of the correctness, security, and privacy aspects of T-FIM. To demonstrate the practical feasibility of T-FIM, we evaluated the additional overhead through experimental evaluations. Additionally, we compared its performance with other similar schemes to provide a comprehensive understanding of its capabilities and advantages.
APA, Harvard, Vancouver, ISO, and other styles
44

Brindha, S. Former Assistant Professor of Business Administration, and R. D. Assistant Professor Department of Computer Science Sivakumar. "BLOCKCHAIN-BASED IDENTITY MANAGEMENT IN FINANCIAL SERVICES." Indian Journal of Research and Development Systems in Technologization 1, no. 1 (2024): 44–56. https://doi.org/10.5281/zenodo.10852538.

Full text
Abstract:
<em>The financial services industry in the rapidly changing times has additional needs for strong, cyber secure, and accurate identity management tool. Traditional method approaches usually meet several barriers like privacy issues, data security, and ineffective authentication processes. This paper sets out how blockchain-based solutions can solve these issues and proposes currently a new approach to identity management in the financial sphere. In view of its distributed and unchangeable character, the paper discusses the possible benefits of incorporating blockchain technology into the fields of digital identity verification. Through a thorough research of the literature and the case studies, we make the case study of how blockchain can contribute to the improvement of security, fraud reduction and the overall improvement of the identity management systems. The paper also takes a look at how blockchain-based identity solutions are implemented in the financial world at large, with pilots being used to assess practicality and scalability. The results signify the opportunity to simplify onboarding procedures, to establish credence among all participants, and to pull down drop in the costs of identifying individuals. Thus, this study is adding to growing knowledge about blockchain technology as a financial tool, providing insights into its revaluation power and opportunity for identity management. The significance of the research is not only theoretical; the practical direction stood out and it may also give directions for practicing professionals, policymakers, as well as researchers when dealing with financial services and blockchain interconnection.</em>
APA, Harvard, Vancouver, ISO, and other styles
45

Alsayed Kassem, Jamila, Sarwar Sayeed, Hector Marco-Gisbert, Zeeshan Pervez, and Keshav Dahal. "DNS-IdM: A Blockchain Identity Management System to Secure Personal Data Sharing in a Network." Applied Sciences 9, no. 15 (2019): 2953. http://dx.doi.org/10.3390/app9152953.

Full text
Abstract:
Identity management (IdM) is a method used to determine user identities. The centralized aspect of IdM introduces a serious concern with the growing value of personal information, as well as with the General Data Protection Regulation (GDPR). The problem with currently-deployed systems and their dominating approach, with identity providers (IdP) and single-point services, is that a third party is in charge of maintaining and controlling the personal data. The main challenge to manage data securely lies in trusting humans and institutes who are responsible for controlling the entire activity. Identities are not owned by the rightful owners or the user him/herself, but by the mentioned providers. With the rise of blockchain technology, self-sovereign identities are in place utilizing decentralization; unfortunately, the flaws still exist. In this research, we propose DNS-IdM, a smart contract-based identity management system that enables users to maintain their identities associated with certain attributes, accomplishing the self-sovereign concept. DNS-IdM has promising outcomes in terms of security and privacy. Due to the decentralized nature, DNS-IdM is able to avoid not only the conventional security threats, but also the limitations of the current decentralized identity management systems.
APA, Harvard, Vancouver, ISO, and other styles
46

Preetham Kumar Dammalapati. "Understanding federated identity management: Architecture, protocols and implementation." World Journal of Advanced Engineering Technology and Sciences 15, no. 3 (2025): 401–11. https://doi.org/10.30574/wjaets.2025.15.3.0919.

Full text
Abstract:
Federated Identity Management (FIM) emerges as a critical solution for organizations navigating the complexities of modern digital environments, where identity management across disparate systems presents significant security challenges. By establishing trust relationships between identity providers and service providers, FIM enables seamless authentication across organizational boundaries while maintaining robust security controls. This comprehensive framework eliminates redundant authentication processes, reduces credential proliferation, and addresses the fragmentation issues inherent in multi-cloud environments. The architecture encompasses identity providers, service providers, trust frameworks, and claims mechanisms working in concert through standardized protocols such as OAuth 2.0, OpenID Connect, SAML, and WS-Federation. FIM delivers transformative benefits including enhanced user experience through Single Sign-On capabilities, strengthened security posture via centralized authentication, and substantial operational efficiencies. While implementation considerations such as just-in-time provisioning, attribute mapping, session management, and trust chain security present notable challenges, various architectural patterns including hub-and-spoke, mesh federation, and broker models offer flexible deployment options to match organizational requirements. As digital transformation accelerates, emerging trends such as decentralized identity, continuous authentication, and Zero Trust integration are reshaping the federation landscape.
APA, Harvard, Vancouver, ISO, and other styles
47

Gujar, Vivek. "IDENTITY MANAGEMENT, SSI AND BLOCKCHAIN: A REVIEW." International Journal of Engineering Applied Sciences and Technology 08, no. 07 (2023): 38–45. http://dx.doi.org/10.33564/ijeast.2023.v08i07.007.

Full text
Abstract:
As an individual, in the social and digital world, the burden of managing multiple online IDs and passwords, while handling a host of documents e.g passports, driver’s licenses, Social Security/Aadhar cards and medical insurance cards is cumbersome. Identities both in the social and digital world requires security and privacy: managing these identities efficiently is called Identity Management. Once these identities established, they are produced, shown, send, verified in some way or the other for various processes in Government and non Government purposes. Lately it is established that Blockchain technology has immense use to control over identities (Identity Management) with complete secrecy and privacy. Self-sovereign identity (SSI) is undergoing a transformative evolution, driven by the integration of blockchain technology and Facial Recognition Technology (FRT). This envisioned future entails a paradigm shift where unique facial features serve as the secure key for unlocking one's identity. Blockchain, functioning as a decentralized and secure repository, facilitates the storage of facial data. This convergence of SSI, blockchain, and FRT not only augments security but also streamlines authentication processes, reducing the reliance on conventional passwords and identification documents. It’s a future where individuals can seamlessly access their data, marking a significant advancement in secure and personalized identity management within an academic context.
APA, Harvard, Vancouver, ISO, and other styles
48

L.Swathi, K., P. Divya, A. Amruthavarshini, and Dr B.VijayaBabu. "Implementation of Identity Management Using Open ID Protocol." International Journal of Engineering & Technology 7, no. 2.32 (2018): 104. http://dx.doi.org/10.14419/ijet.v7i2.32.13538.

Full text
Abstract:
Identity Management has turned into an imperative theme in the distributed computing conditions, where cloud suppliers need to control usernames, passwords and other data used to recognize, validate and approve clients for some, unique facilitated applications. Every one of the vulnerabilities seen on non-cloud arrangements are presently found in the cloud, yet different issues are presented. One would be the capacity to oversee characters of clients when sending information to the cloud .Second would be the identity administration of clients accepting information from the cloud. Furthermore, third would be administration of user id’s when information is moved from cloud to cloud. Open ID is an open standard and decentralized confirmation protocol. Promoted by the non-benefit Open ID Foundation, it enables clients to be verified by co-working locales (known as Relying Parties or RP) utilizing an outsider administration, taking out the requirement for website admin to give their own particular specially appointed login frameworks, and enabling clients to sign into numerous inconsequential sites without having a different personality and secret key for each.
APA, Harvard, Vancouver, ISO, and other styles
49

Cui, Ping. "Decentralized identity management based on autonomous identity in e-commerce and its application to key opinion leader." IET Conference Proceedings 2024, no. 21 (2025): 331–35. https://doi.org/10.1049/icp.2024.4247.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Geetha, R., T. Padmavathy, and G. Umarani Srikanth. "A Scalable Block Chain Framework for User Identity Management in a Decentralized Network." Wireless Personal Communications 123, no. 4 (2021): 3719–36. http://dx.doi.org/10.1007/s11277-021-09310-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!