You are on page 1of 10

Department of Computer Science and Engineering

VII Semester, B.E


Code: CSSE

Blockchain for Identity


Management
BY
MAHESH
1MS19CS066

UNDER THE GUIDANCE OF


DR. GEETHA J
2
Agenda

 Introduction
 Literature Review
 Research Gap Analysis
 Social Impact
 Conclusion
 Future Work
 References
3
Introduction

Identity management, or identity and access management, applies to any situation where someone uses a
login process to use an app or website and has specific levels of access to information, technology, or
service.
A digital identity is the total information about an individual or organization that exists online.
The current Identity management system has risk of the data breaches, bad user experience managing many
login accounts, expensive and time-consuming validity checks, identity theft, lack of data control and
integrity.

A blockchain is a decentralized, distributed and public digital ledger that is used to record transactions
across many computers so that the record cannot be altered retroactively without the alteration of all
subsequent blocks and the consensus of the network.

As an alternative blockchain based solution can provide security and integrity of the system and also by
maintaining the privacy of the users. 
4
Literature Review

 The Identity Management can be broadly categorized into centralized, federated, user-centric, and
decentralized. In centralized Identity management, the identity provider has complete control to
manage the identity of users and provide them authentication services.
 Federated Identity management, on the other hand, is an arrangement between two or more
organizations to allow users from one domain to authenticate and access services of other domains.
 However, current centralized and federated digital identity models do not allow for complete
independence or control by the user.
  On the other hand, a user-centric identity tries to give control of identity to its owners while reducing
identity information disclosure of personal information.
 Decentralized identity management will enable consumers to manage and maintain their identity on a
blockchain that is not controlled by a single central authority. This allows users to decide what, when,
and with whom they want to share their information.
5
Research Gap Analysis

Elimination of Intermediaries: Each blockchain-based identity management offers the decentralized solution to alleviate the control of
centralized authorities. However, most of these solutions relies upon central server or intermediaries for data storage and key revocation.

Trust Required: The trust and reputation between attestation verifiers and relying parties is essential to certify identity attributes.

Scalabilityand Optimization: The scalability and optimization aspects for distributed Identity management is essential to uptake
adoption to avoid considerable delay in specific use cases

Privacy-enhancing identity management: As the user-controlled identity demands transparent flow of data, identity management
infrastructure should be designed to support pseudonymity while maintaining required degrees of confidentiality, integrity, authenticity,
nonrepudiation and robustness.

Flexibility: To ensure the interoperability in the real world application, the integration of blockchain based Identity with existing
solutions can initiate rapid acceptance in the market as compare to novel solution. It must ensure the smooth transfer with minimum
identity data of identity to other platform.
User experience: The design of IdM must be based open standards and established protocols to ensure maximum transparency and
adoption.
6
Social Impact

 Identity systems are unavailable in many countries. Even where it is, the data is unreliable and non-
secure. Globally, ~1 billion are estimated living without a proper ID, and ~2.5 billion still unable to
access basic services like a bank account. Using blockchain, biometrics and credentials issued from
various institutions to create a digital identity for such people.
 Blockchain-based identity applications can serve many interventions. The World Food Program is using
it to disburse food aid to Syrian refugees in Jordan. This ensures aid reaches the intended beneficiary
while avoiding inflated invoices, since paper-based vouchers are prone to theft and corruption.
 Blockchain identity management doesn’t set any geographical boundaries. So, users can use the
platform across borders to verify their identity.
7
Conclusion

 Identity and access management is the framework of processes, policies, and technologies to ensure that
only authorized people have access to technology resources, information, or services. The problems with
conventional identity management systems include: The risk of data breaches, A bad user experience with
people having to manage so many login accounts, Expensive verification processes, Identity theft, Lack of
data ownership and control, Inaccessibility to identity.
 Blockchain identity management technology can effectively solve these problems and has these benefits:
Provide more data security, Enables faster verification, Reducing costs, Prevent identity fraud, Create an
auditable trail of records, Facilitating legal data compliance, Creating automated processes, Increasing
accessibility to identity.
8
Future Work

 Blockchain technology is in its infancy. There are clear signs that future business solutions for security and
privacy will include blockchain technology.
 While blockchain offers a beneficial model to make identities portable, verifiable, secure and private, still
potential challenges are remained to be addressed such as Scalability, optimization and flexibility.
 A report by Market Research Future says that the blockchain identity market valuation will reach 17.81
billion by 2030 with a compound annual growth rate at 56.60% between 2022 to 2030.
 The market expansion is predicted to be helped through the expansion of governmental initiatives for
blockchain technology development in both developed and emerging countries.
 We can see various use cases of the blockchain identity system such as loan applications, Identity Verification
in Legal Processes, Verification of Employee Background, Immigration, Verifying Ecommerce Identity.
9
References

 [1]P.Gururaj. (2000). Identity management using permissioned blockchain.IEEE. https://ieeexplore.ieee.org/document/9203031

 [2] Z. Song, Y. Yu. (2022). The Digital Identity Management System Model Based on Blockchain. IEEE.
https://ieeexplore.ieee.org/document/9845097

 [3] H. Nusantoro, R. Supriati, N. Azizah, N. P. L. Santoso, S. Maulana. (2021). Blockchain Based Authentication For Identity
Management. IEEE. https://ieeexplore.ieee.org/document/9589001

 [4] S. Haddouti, M. Kettani. (2019). Analysis of Identity Management Systems Using Blockchain Technology. IEEE.
https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8742375

 [5] K. Gilani, E.Bertin, J. Hatin, N. Crespi. (2020). A Survey on Blockchain-based Identity Management and Decentralized
Privacy for Personal Data. IEEE. https://ieeexplore.ieee.org/document/9223312

 [6] A. Grüner, A. Mühle, T. Gayvoronskaya and C. Meinel.(2018). A Quantifiable Trust Model for Blockchain-Based Identity
Management. IEEE International Conference on Internet of Things. https://ieeexplore.ieee.org/stamp/stamp.jsp?
tp=&arnumber=8726703
10

 [7] I. T. Javed, F. Alharbi, B. Bellaj, T. Margaria, N. Crespi, K. N. Qureshi.(2021). Health-ID: A


Blockchain-Based Decentralized Identity Management for Remote Healthcare. Healthcare, 9(6),
712. MDPI AG. http://dx.doi.org/10.3390/healthcare9060712
 [8] Odelu, V. (2020). IMBUA: Identity Management on Blockchain for Biometrics-Based User
Authentication. In: Prieto, J., Das, A., Ferretti, S., Pinto, A., Corchado, J. (eds) Blockchain and
Applications. BLOCKCHAIN 2019. Advances in Intelligent Systems and Computing, vol
1010 . Springer, Cham.  https://doi.org/10.1007/978-3-030-23813-1_1

 [9] X. Xiang, M. Wang, W. Fan. (2020). A Permissioned Blockchain-Based Identity


Management and User Authentication Scheme for E-Health Systems. IEEE.
https://ieeexplore.ieee.org/document/9187630

 [10] X.Zhu, Y.Badr. (2018). A Survey on Blockchain-based Identity Management Systems for
Internet Of Things. IEEE. https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8726747

You might also like