37 Hits in 2.1 sec

A Survey on Blockchain-based Identity Management and Decentralized Privacy for Personal Data

Komal Gilani, Emmanuel Bertin, Julien Hatin, Noel Crespi
2020 2020 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS)  
In the digital revolution, even secure communication between individuals, services and devices through centralized digital entities presents considerable risks.  ...  Firstly, we discussed an overview of Identity management approaches, introducing an architecture overview as well as the relevant actors in such a system and blockchain technology as solution for distributed  ...  The scalability and optimization aspects for distributed IdMs is essential to uptake adoption. • Communication parties trust: The trust and reputation between attestation verifiers and relying parties  ... 
doi:10.1109/brains49436.2020.9223312 dblp:conf/brains/GilaniBHC20 fatcat:bqud3palbncrxetmx7g444qrk4

Towards a Blockchain based digital identity verification, record attestation and record sharing system [article]

Mehmet Aydar and Serkan Ayvaz and Salih Cemil Cetin
2020 arXiv   pre-print
In this study, we investigate the inefficiencies of traditional identity systems, and discuss how a proper implementation of Blockchain technology would result in safer, more secure, privacy respecting  ...  The Covid-19 pandemic has made individuals and organizations to rethink the way of handling identity verification and credentials sharing particularly in quarantined situations.  ...  For instance, individuals who have earned a particular college degree in India have to go through trusted third parties, costing them a significant amount of money and time in order to prove their degrees  ... 
arXiv:1906.09791v2 fatcat:i36gu3szuradfld32rerjn7qka

Federation of Attribute Providers for User Self-Sovereign Identity

Pedro Coelho, André Zúquete, Hélder Gomes
2018 Journal of Information Systems Engineering & Management  
for personal attributes and their need to trust in such attributes.  ...  In a world where people must subject themselves to high scrutiny in every process they initiate, and in a world where the digital environment grows incessantly, we anticipate more online services asking  ...  The current revocation method involves an amount of cryptocurrency controlled by both parties. A document becomes revoked when one or both parties spend that amount of currency.  ... 
doi:10.20897/jisem/3943 fatcat:37bt6sgruvfn5pnhauertsvmae

Security and Privacy Challenges and Potential Solutions for DLT based IoT Systems

Santeri Paavolainen, Pekka Nikander
2018 2018 Global Internet of Things Summit (GIoTS)  
In this paper, we illustrate these concerns through use case examples.  ...  We discuss the implications these concerns on the use of distributed ledgers within higher-level systems, such as in SOFIE, a DLT-based approach to securely and openly federate IoT systems.  ...  Revocation. In a situation where access or other rights are revoked from a party, it is often crucial that the revocation event is distributed in a timely and predictable manner.  ... 
doi:10.1109/giots.2018.8534527 dblp:conf/giots/PaavolainenN18 fatcat:qs4w2sy3prgxhcnepfq5derbzy

Identity Management Systems for the Internet of Things: A Survey Towards Blockchain Solutions

Xiaoyang Zhu, Youakim Badr
2018 Sensors  
access control, privacy preserving, trust and performance respectively.  ...  Then, we trace the identity problem back to the origin in philosophy, analyze the Internet digital identity management solutions in the context of IoT and investigate recent surging blockchain sovereign  ...  Frameworks of evaluating the distributed systems such as in [97] are indispensable in order to measure the performance of distributed systems.  ... 
doi:10.3390/s18124215 fatcat:pcjlwsh6mvdofhkzb5c4wrdavy

Building a Credential Exchange Infrastructure for Digital Identity: A Sociohistorical Perspective and Policy Guidelines

Mawaki Chango
2022 Frontiers in Blockchain  
In addition, the article defines or elaborates on key concepts including identity, credential and trust.  ...  enabling trust around digital identity infrastructure and transactions, both within related ecosystems and in the broader society.  ...  : through their thoughtful reading and insightful comments they have tremendously helped clarify my thinking and improve this written piece.  ... 
doi:10.3389/fbloc.2021.629790 fatcat:5xbmerqmxncfni46b5gci35io4

A trusted approach for decentralised and privacy-preserving identity management

Rafael Torres Moreno, Jesus Garcia-Rodriguez, Jorge Bernal Bernabe, Antonio Skarmeta
2021 IEEE Access  
In addition, each party must be authenticated and authorized to perform transactions on that channel.  ...  In other words, all parties (including users) trust that everything works as expected.  ...  His scientific activity is mainly devoted to the security, trust, and privacy management in distributed systems. He is also interested in security and privacy aspects in the Internet of Things.  ... 
doi:10.1109/access.2021.3099837 fatcat:3ht7rgngk5crtp77h4grgoe52y

Blockchain Technology the Identity Management and Authentication Service Disruptor: A Survey

Shu Yun Lim, Pascal Tankam Fotsing, Abdullah Almasri, Omar Musa, Miss Laiha Mat Kiah, Tan Fong Ang, Reza Ismail
2018 International Journal on Advanced Science, Engineering and Information Technology  
The paper concludes with the open issues, main challenges and directions highlighted for future work in this area.  ...  This solution would include the individual's consolidated digital identity as well as their set of verified attributes that have been cryptographically signed by various trusted issuers.  ...  User devices can utilise unique hardcoded keys to perform software authentication, encryption, and decryption. 3) Trusted Third Party authentication Employing Trusted Third Party (TTP) services within  ... 
doi:10.18517/ijaseit.8.4-2.6838 fatcat:shrmouxcgjhs3ddtkoofguo2g4

Verifiable Credential Proof Generation and Verification Model for Decentralized SSI-Based Credit Scoring Data

Kang Woo CHO, Byeong-Gyu JEONG, Sang Uk SHIN
2021 IEICE transactions on information and systems  
This paper proposes a model for VC generation and revocation verification for credit scoring data.  ...  Previously proposed financial identity services mostly adopted centralized servers that are prone to singlepoint-of-failure problems and performance bottlenecks.  ...  Acknowledgments This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (No. 2019R1I1A3A01060652), and  ... 
doi:10.1587/transinf.2021ngp0006 fatcat:hgd5y54xgjdn7ahsfqvbnsth5a

Self-Sovereign Identity: A Systematic Map and Review [article]

Frederico Schardong, Ricardo Custódio
2021 arXiv   pre-print
In this model, the user maintains and controls their data. When requested by a service provider, user data is sent directly by the user, without the intermediation of third parties.  ...  Thus, in Self-Sovereign Identity, the participation of known identity providers for proof of identity is reduced, which increases user privacy.  ...  These processes are performed through multi-factor authentication [105] and cryptographic techniques such as digital signature and public-key cryptography [136] .  ... 
arXiv:2108.08338v1 fatcat:sttx2medrvcrfdvpefyrk2x57q

Privacy-preserving solutions for Blockchain: review and challenges

Jorge Bernal Bernabe, Jose L. Canovas, Jose L. Hernandez-Ramos, Rafael Torres Moreno, Antonio Skarmeta
2019 IEEE Access  
In this sense, this paper performs a systematic review of the current state of the art on privacy-preserving research solutions and mechanisms in blockchain, as well as the main associated privacy challenges  ...  in this promising and disrupting technology.  ...  The web of trust supported by the sovrin trust anchors provides verifiability of the target party being interacted.  ... 
doi:10.1109/access.2019.2950872 fatcat:kf2rl7onmrbvnozjudspxrcatu

AuthChain: A Decentralized Blockchain-based Authentication System

Shu Yun Lim, Pascal Tankam Fotsing, Omar Musa, Abdullah Almasri
2020 International Journal of Engineering Trends and Technoloy  
Distributed Ledger Teachnology (DLT) in general and blockchain can offer a solution by decentralizing ownership of credentials and a protocol for verifying one's record in an immutable chain of data.  ...  Current online services rely blindly on authentication providers to perform identity management and authentication.  ...  The CertCoin layout additionally facilitates trusted key distribution that makes it more suitable for performance conscious applications.  ... 
doi:10.14445/22315381/cati1p212 fatcat:ybnujesfyfgvbjwjne5lrcolmq

A Security Analysis of Blockchain-based DID Services

Bong Gon Kim, Young-Seob Cho, Seok-hyun Kim, Hyoungshick Kimb, Simon S. Woo
2021 IEEE Access  
In this paper, we systemically explore key components of DID systems and analyze their possible vulnerabilities when deployed.  ...  Hence, problems can occur for trust on first use [48] or blind trust before verification [49] cases, which implicate that the user has to blindly trust the other party before DID connection [47]  ...  We assume the most common use case scenario, where the local user A's edge agent (EA) aims to communicate with the remote party B 's EA through DID communication and perform the wallet backup and recovery  ... 
doi:10.1109/access.2021.3054887 fatcat:jvcjhgeiy5aclikgv4m6gnpnlm

Self-sovereign and Decentralized identity as the future of identity management?

Michael Kubach, Christian H. Schunck, Rachelle Sellung, Heiko Roßnagel
2020 Open Identity Summit  
Therefore, it is no surprise that new approaches based on high-impact technologies, such as distributed ledgers and blockchain, have attracted major attention in the last 3-4 years, both in industry and  ...  In this approach, a central authority controls identifier origination and/or issuance while power may be delegated hierarchically through roles.  ... 
doi:10.18420/ois2020_03 dblp:conf/openidentity/KubachSSR20 fatcat:m5xtbhoz2zbshogbwcppmckzqa

A Distributed Trust Framework for Privacy-Preserving Machine Learning [article]

Will Abramson, Adam James Hall, Pavlos Papadopoulos, Nikolaos Pitropakis, William J Buchanan
2020 arXiv   pre-print
This paper outlines a distributed infrastructure which is used to facilitate peer-to-peer trust between distributed agents; collaboratively performing a privacy-preserving workflow.  ...  However, this engenders a lack of trust between data owners and data scientists. Data owners are justifiably reluctant to relinquish control of private information to third parties.  ...  The FL method has many variations, such as Vanilla, Trusted Model Aggregator, and Secure Multi-party Aggregation [6] .  ... 
arXiv:2006.02456v1 fatcat:hhz3aqx7prhplmurt4i23u7jq4
« Previous Showing results 1 — 15 out of 37 results