scholarly journals A Scalable Block Chain Framework for User Identity Management in a Decentralized Network

Author(s):  
Geetha R ◽  
T. Padmavathy ◽  
G.Umarani Srika

Abstract In a decentralized network every user makes use of personal identity details at different places for various services and these details are shared with third-parties without their consent and stored at an unknown location. Organizations like government, banks and social platforms are considered to be the weakest point in the current identity management system as they are vulnerable which leads to compromising billions of user identity data. Block chain based User Identity Management is a solution which provides a decentralized environment that manages the user identity data and their related Know-Your-Customer (KYC) documents in a distributed ledger. All the transactions of the network are stored in the block which is a type of a data structure and these blocks are validated using the powerful consensus algorithms and linked to form a block chain. Smart contracts will act as an interface between the client and the block chain network. User’s information cannot be provided to any third party vendors without the explicit consent of the user. This paper proposes a framework for User Identity Management using Block chain technology in a decentralized Network. The proposed framework ensures a high level privacy and security for the personal identity details and the documents. In addition to that the performance analysis of the framework is presented in terms of Transaction, Mining Resource and Difficulty Variation.

Doklady BGUIR ◽  
2020 ◽  
Vol 18 (7) ◽  
pp. 14-22
Author(s):  
D. A. Kachan ◽  
U. A. Vishniakou

The purpose of this article is to analyze methods, approaches, and tools of distributed ledger technology (DLT) for working with documents in education. The objectives of the article are to analyze problems with the authentication of educational documents, develop new structural solutions using block chain technology, consider two models, and evaluate their use for educational documents.Authentication of educational documents is carried out using state registers, which is a complex and resource-intensive process. There is an increase in the number of forged documents in the world, which calls into question the effectiveness of modern mechanisms. Distributed ledger technology (block chain) is a sustainable technological trend that affects the development and quality of the digital economy. The existence of a mechanism for verifying the authenticity of educational documents that is resistant to malicious manipulation is an urgent task that goes beyond the sphere of education, possible solutions to which are proposed to be considered in this paper.The article provides a brief description of DLT and considers the approach of using the technology to authenticate educational documents. It consists of two main stages: the issue of a digital educational document and its verification. The role of a trusted third party in the issue and validation process is considered. The paper presents the models for issuing and validating digital documents based on distributed ledger technology, which allows one to eliminate the limitations and shortcomings of existing approaches. The effectiveness of the approach based on the proposed models is revealed. The formulated approaches can be applied in various socio-economic areas and public administration to work with similar documents.


2021 ◽  
Vol 11 (4) ◽  
pp. 3807-3822
Author(s):  
Shabna Salam ◽  
K. Praveen Kumar

Block chain is a distributed ledger that offers secure and immutable storage. E–governance allows exchange of information between government and citizens or organizations through latest information and communication technologies. The E governance services facilitate efficient and fast access of services; on the other hand it raises potential risks of breaching into privacy and Security. Blockchain based e-governance system offers secure and transparent services without intermediary. This paper investigates the scope and challenges of adopting blockchain technology as a platform for E-Governance.


Author(s):  
Mohammad Zubair ◽  
Devrim Unal ◽  
Abdulla Al-Ali ◽  
Thomas Reimann ◽  
Guillaume Alinier

Background: IoMT (Internet of Medical Things) devices (often referred to IoMT domain) have the potential to quickly diagnose and monitor patients outside the hospital by transmitting information through the cloud domain using wireless communication to remotely located medical professionals (user domain). shows the proposed IoMT framework designed to improve the privacy and security of the healthcare infrastructure. Methods: The framework consists of four modules: 1. Intrusion Detection System (IDS) using deep learning (DL) to identify bluetooth-based Denial-of-Service (DoS)-attacks on IoMT devices and is deployed on edge-computing to secure communication between IoMT and edge. 2. IDS is backed up with identity-based cryptography to encrypt the data and communication path. 3. Besides the identity-management system (to authenticate users), it is modeled with aliveness detection using face authentication techniques at the edge to guarantee the confidentiality, integrity, and availability (CIA) of the framework. 4. At the cloud level, another IDS using MUSE (Merged-Hierarchical-Deep-Learning-System-with-Layer-Reuse) is proposed to protect the system against Man-In-The-Middle attacks, while the data is transferred between IoMT-EDGE-CLOUD. Results: These four modules are developed independently by precisely analyzing dependencies. The performance of IDS in terms of precision is 99% and for the identity-management system, the time required to encrypt and decrypt 256-bit key is 66 milliseconds and 220 milliseconds respectively. The true positive rate is 90.1%, which suggests real-time detection and authentication rate. IDS (2) using MUSE (12-layer) the accuracy is >95%, and it consumes 15.7% to 27.63% less time to train than the smaller four-layer model. Conclusion: Our designed models suit edge devices and cloud-based cybersecurity systems and support the fast diagnosis and care required by critically ill patients in the community.


2021 ◽  
Author(s):  
Regonda Nagaraju ◽  
Selvanayaki Kolandapalayam Shanmugam ◽  
Sivaram Rajeyyagari ◽  
Jupeth Toriano Pentang ◽  
B Kiran Bala ◽  
...  

Abstract E-Government refers to the administration of Information and Communication Technologies (ICT) to the procedures and functions of the government with the objective of enhancing the transparency, efficiency and participation of the citizens. E-Government is tough systems that require distribution, protection of privacy and security and collapse of these could result in social and economic costs on a large scale. Many of the available e-government systems like electronic identity system of management (eIDs), websites are established at duplicated databases and servers. An established validation and management system could face a single failure point and the system is prone to Distributed Denial of Service Attacks (DDoS), denial of service attacks (DoS), malware and other cyber attacks. The execution of a privacy preserving and a secure decentralized system is enabled by the block chain technology. Here any third-party organizations do not have any control over the transactions of the Government. With the help of block chain technology, new and existing data are encapsulated within ledger or blocks, which are evenly distributed through the network in an enduring and sustainable way. The privacy and security of information are improved with the help of block chain technology, where distribution and encryption of data are performed through the total network. This analytical paper maps out the analysis of the security in the e-government system, utilizing the block chain technology that provides privacy and security of information and thereby enhancing the trust among the public sector. Qualitative and theoretical analysis is made for the proposed topic and implications of privacy and security of the proposed system is made.


2019 ◽  
Vol 9 (15) ◽  
pp. 2953 ◽  
Author(s):  
Jamila Alsayed Kassem ◽  
Sarwar Sayeed ◽  
Hector Marco-Gisbert ◽  
Zeeshan Pervez ◽  
Keshav Dahal

Identity management (IdM) is a method used to determine user identities. The centralized aspect of IdM introduces a serious concern with the growing value of personal information, as well as with the General Data Protection Regulation (GDPR). The problem with currently-deployed systems and their dominating approach, with identity providers (IdP) and single-point services, is that a third party is in charge of maintaining and controlling the personal data. The main challenge to manage data securely lies in trusting humans and institutes who are responsible for controlling the entire activity. Identities are not owned by the rightful owners or the user him/herself, but by the mentioned providers. With the rise of blockchain technology, self-sovereign identities are in place utilizing decentralization; unfortunately, the flaws still exist. In this research, we propose DNS-IdM, a smart contract-based identity management system that enables users to maintain their identities associated with certain attributes, accomplishing the self-sovereign concept. DNS-IdM has promising outcomes in terms of security and privacy. Due to the decentralized nature, DNS-IdM is able to avoid not only the conventional security threats, but also the limitations of the current decentralized identity management systems.


In the digital world, the crypto currency has to do with the use of tokens based on the distributed ledger technology in a secure manner. Crypto currency can be a resource on a block chain network or can be seen as a tool to perform the transactions ensuring the privacy and security. Data may be available in temporal or text format. This paper describes about the distributed architecture for secure and attack-resilient bit coin-based crypto currency transactions for classified temporal and text data. The temporal data may be voice, sound or graphical information basing on the time series. If the data available is temporal this work describes about how it can be classified into a processed form. In this context, this paper describes the process of converting temporal data into text data. Further, the paper describes about the process of ensuring the security. This paper describes about the methodologies of cryptography-based hashing, attack-resilient nonce generation and verifiable encryption techniques for the construction of resilient transactions against stealthy data-integrity attack.


Author(s):  
Monica Gahlawat

Secure identity management is one of the controversial topics in the cybersecurity landscape. The user needs to rely on third-party providers for managing their personal information, which is a big security concern. Traditional identity systems typically suffer from single points of failure, lack of interoperability, and privacy issues such as encouraging mass data collection and user tracking. Blockchain technology has the potential to support novel data ownership and governance models with built-in control and consent mechanisms, which may benefit both users and businesses by alleviating these concerns. Blockchain-based systems provide the possibility for their users to insert their data in this distributed ledger. Users can trust the blockchain as it is leveraging consensus mechanisms to validate and gather the transactions in immutable blocks. The transparent and decentralized nature of the blockchain network enables the development of a non-refutable and unbreakable record of data, which is the fundamental feature of many applications, such as identity management.


2020 ◽  
Vol 10 (19) ◽  
pp. 6749
Author(s):  
Alessandra Pieroni ◽  
Noemi Scarpato ◽  
Lorenzo Felli

The Internet of Things (IoT) as a concept is fascinating and exciting, with an exponential growth just beginning. The IoT global market is expected to grow from 170 billion USD in 2017 to 560 billion USD by 2022. Though many experts have pegged IoT as the next industrial revolution, two of the major challenging aspects of IoT since the early days are having a secure privacy-safe ecosystem encompassing all building blocks of IoT architecture and solve the scalability problem as the number of devices increases. In recent years, Distributed Ledgers have often been referred to as the solution for both privacy and security problems. One form of distributed ledger is the Blockchain system. The aim of this paper consists of reviewing the most recent Blockchain architectures, comparing the most interesting and popular consensus algorithms, and evaluating the convergence between Blockchain and IoT by illustrating some of the main interesting projects in this research field. Furthermore, the paper provides a vision of a disruptive research topic that the authors are investigating: the use of AI algorithms to be applied to IoT devices belonging to a Blockchain architecture. This obviously requires that the devices be provided with adequate computational capacity and that can efficiently optimize their energy consumption.


Sign in / Sign up

Export Citation Format

Share Document