You are on page 1of 2

In the era of digitalization does secure communication even exist?

surely the means we use arent secure .How often we hear about privacy data leaks,

to secure communications we can have individuals digital identity along with access

attributes to view the sensitive documents like educational certificates etc .

The authentication and verification of digital identity is essential to achieve the


privacy and security of distributed digital identities.

Hence use of block chain which is transparent and secure ledger can provide
efficient and secure way of sharing credentials.

-----------------------------------------------------------------------------------
--------------------------------------------------------
this paper providescoherent view of the central concepts of self-sovereign
Identity,
including the components of identity proofing and
authentication solutions for different self-sovereign Identity solutions.

eliminating the central service providers is one


unique digital identity that is build, managed and controlled
by identity owner. Such identity that provides user centric
data ownership is called self-sovereign identity.
The self-sovereign Identity
provides the ownership of data to user to promote user
control and transparency.

The
blockchain technology recognized as temper resistant and
transparent ledger [4]. Thus, it can be used to bind the users
with the claims they make to prevent the identity frauds

Identity management is an administrative process to


create and maintain user account to be used for
authentication and identification in online services. It is
required to simplify the user provision process and ensure the
rightful users can have access to the services.

Thereby a secure and transparent means of sharing sensitive data using blockchain
is found ,
so that the owner of data can control the information without relying on third
parties

-----------------------------------------------------------------------------------
----------------------------------------------
The paper aims to resolve security issues revolving
around the sharing of students’ credentials by leveraging the
blockchain technology.

Decentralized application along with the smart contracts govern the interactions
between multiple stakeholder.
different stakeholder have diff functions
Registration of User: assigns a unique ID to every user.
sign up , sign in
enrollment
uploading of credentials
accessing and providing access

When a
credential is uploaded on IPFS, a hash value is returned. This
hash value along with the metadata of the credential is pushed
to the Ethereum such that only intended student can view
it.

take aways from this paper is a simple blockchain#based architecture for secure
sharing student’s credentials

You might also like