Digital Identity Management System Using Blockchain Technology

Author(s):  
Ei Shwe Sin ◽  
Thinn Thu Naing
2021 ◽  
Vol 28 (1) ◽  
Author(s):  
O. Aweh ◽  
S.C. Chiemeke

Identity management concerns transcends technical design issues as users disposition, awareness and attitude play a vital role in the effectiveness of such systems. A framework that supported some important digital identity management system security related features was presented in a previous study. In this current study, an attempt to empirically demonstrate the functioning of these features and to access how user’s awareness, disposition and attitude impact on the proper functioning of such systems was undertaken. To achieve these, a system was modeled and implemented using object oriented analysis and design method. The developed system empirically generates forensic evidence and an implicit mutual authentication scheme. The resulting system developed was tested for these features. The results obtained showed that the framework did provide for reliable forensic evidence generation and it also provided for the implementation of an implicit form of mutual authentication scheme. However, the outcome of a brief test conducted to gauge the reliability of this implicit mutual authentication scheme showed that the support provided was not very reliable based on these users’ factors (awareness, attitude and deposition)


Author(s):  
A. Shobanadevi ◽  
Sumegh Tharewal ◽  
Mukesh Soni ◽  
D. Dinesh Kumar ◽  
Ihtiram Raza Khan ◽  
...  

Author(s):  
Reema Bhatt ◽  
Manish Gupta ◽  
Raj Sharman

Identity management is the administration of an individual's access rights and privileges in the form of authentication and authorization within or across systems and organizations. An Identity Management system (IdM) helps manage an individual's credentials through the establishment, maintenance, and eventual destruction of their digital identity. Numerous products, applications, and platforms exist to address the privacy requirements of individuals and organizations. This chapter highlights the importance of IdM systems in the highly vulnerable security scenario that we live in. It defines and elaborates on the attributes and requirements of an effective identity management system. The chapter helps in establishing an understanding of frameworks that IdM systems follow while helping the reader contrast between different IdM architecture models. The latter part of this chapter elaborates on some of today's most popular IdM solutions.


Sign in / Sign up

Export Citation Format

Share Document