Novel identity management system using smart blockchain technology

Author(s):  
A. Shobanadevi ◽  
Sumegh Tharewal ◽  
Mukesh Soni ◽  
D. Dinesh Kumar ◽  
Ihtiram Raza Khan ◽  
...  
JAMIA Open ◽  
2021 ◽  
Author(s):  
Anjum Khurshid ◽  
Cole Holan ◽  
Cody Cowley ◽  
Jeremiah Alexander ◽  
Daniel Toshio Harrell ◽  
...  

Abstract Objective Healthcare systems suffer from a lack of interoperability that creates “data silos,” causing patient linkage and data sharing problems. Blockchain technology’s unique architecture provides individuals greater control over their information and may help address some of the problems related to health data. A multidisciplinary team designed and tested a blockchain application, MediLinker, as a patient-centric identity management system. Methods The study used simulated data of “avatars” representing different types of patients. Thirty study participants were enrolled to visit simulated clinics, and perform various activities using MediLinker. Evaluation was based on Bouras’ criteria for patient-centric identity management and on the number of errors in entry and sharing of data by participants. Results Twenty-nine of the 30 participants completed all study activities. MediLinker fulfilled all of Bouras’ criteria except for one which was not testable. A majority of data errors were due to user error, such as wrong formatting and misspellings. Generally, the number of errors decreased with time. Due to COVID-19, sprint 2 was completed using “virtual” clinic visits. The number of user errors were less in virtual visits than in personal visits. Discussion The evaluation of MediLinker provides some evidence of the potential of a patient-centric identity management system using blockchain technology. The results showed a working system where patients have greater control over their information and can also easily provide consent for use of their data. Conclusion Blockchain applications for identity management hold great promise for use in healthcare but further research is needed before real-world adoption.


Author(s):  
Mardavkumar Gandhi

In the present interconnected world, digital IDs are used to demonstrate identity. These IDs prove to be only tangentially related to the service being accessed and requires us to apply a significant amount of privacy. The current systems possess number of problems such as proxies but blockchain proves to be the solution for this type of Identity related problem.Markers of identity are often required to be very personal pieces of data. Consider a list of personal information collected when someone opens a savings account, such as address and identification (driver’s license or passport). It’s easy to take these pieces of data for granted, as we’ve generally become accustomed to handing them over at the drop of a hat. But let’s take a moment to consider what giving up these pieces of identity really means and whether is it necessary?In handing over a passport to a banker, a person gives the bank full permission to record not only their date and place of birth, but also everywhere he or she has toured.In order to solve above privacy problem and to make Identity sharing process more user friendly I have implemented an Identity Management System with Blockchain technology with the help of hyperledger fabric framework.


TEM Journal ◽  
2020 ◽  
pp. 1338-1347
Author(s):  
Belkacem Athamena ◽  
Zina Houhamdi

This paper describes the identity management system (IdMS) by defining system and user requirements. Additionally, it introduces the IdMS concept that approaches the things identity management. Moreover, the paper deeply describes the IdMS features using unified modelling language (UML) diagrams such as class, system, and sequence diagrams to show the main system functionalities. Ultimately, the suggested system is evaluated by comparing it with the existing systems and discussing the fulfilment of user and system requirements.


Author(s):  
Kenneth J. Giuliani ◽  
V. Kumar Murty

The purpose of this chapter is to examine the strengths and weaknesses of the most commonly used model for digital identities. It is compared to other models which have preceded it, thus giving a background on its development. The models are measured against a set of criteria which it is desirable for an identity management system to have. The underlying hope is that understanding this model will help improve it or even lead to a different model.


Author(s):  
Reema Bhatt ◽  
Manish Gupta ◽  
Raj Sharman

Identity management is the administration of an individual's access rights and privileges in the form of authentication and authorization within or across systems and organizations. An Identity Management system (IdM) helps manage an individual's credentials through the establishment, maintenance, and eventual destruction of their digital identity. Numerous products, applications, and platforms exist to address the privacy requirements of individuals and organizations. This chapter highlights the importance of IdM systems in the highly vulnerable security scenario that we live in. It defines and elaborates on the attributes and requirements of an effective identity management system. The chapter helps in establishing an understanding of frameworks that IdM systems follow while helping the reader contrast between different IdM architecture models. The latter part of this chapter elaborates on some of today's most popular IdM solutions.


Sign in / Sign up

Export Citation Format

Share Document