Skip to main content

Identity Management using Blockchain Technology

Page 1

International Research Journal of Engineering and Technology (IRJET) Volume: 09 Issue: 05 | May 2022

www.irjet.net

e-ISSN: 2395-0056 p-ISSN: 2395-0072

Identity Management using Blockchain Technology Neer Chanchad1, Darshan Limbani2, Jude Silveira3, Harsh Singh4,Ms.Prajyoti Dsilva5 1IT

Dept, SFIT Mumbai,India,neerchanchad2000@student.sfit.ac.in Dept, SFIT Mumbai,India,limbanidarshan2000@student.sfit.ac.in 3IT Dept, SFIT Mumbai,India, judesilveira1@student.sfit.ac.in 4IT Dept, SFIT Mumbai,India,hardharsho312@student.sfit.ac.in 5Professor, Dept. of Information Technology Engineering, St. Francis Institute of Technology(SFIT), Maharashtra, India ---------------------------------------------------------------------***--------------------------------------------------------------------2IT

Abstract

-

Identity Management involves the identification and authentication of a user to access the services provided by various sectors such as banking, healthcare, government, and online transactions. It also helps us set the level of access and authorizations a client has over a system. A few traits of traditional Identity Management Systems are they are insecure and fragmented. Thus the Identity Management System leveraging the Blockchain technology would enable safer management and storage of digital identities by providing unified, interoperable, and tamper-proof infrastructure with key benefits to enterprises and users. In this paper, we propose the use of blockchain technology which is based on Ethereum to store the hash of identities on a blockchain. The hash of data is generated by the InterPlanetary File System (IPFS) and the corresponding hash is stored on the blockchain. The third-party is allowed to request documents from the user for identity verification, the user is then notified of the type of document being requested. The user can either share or deny access to the document. The outcome will be greater privacy, control of sensitive data, and faster access to services.

social security card, automobile license, passport, birth certification, and academy or work badges. Identity Management is the process of authenticating, authorizing, and identifying a thing ( individually or a group of people or the system) to access one or further many resources. The biggest point of the blockchain is its decentralization where the whole database is maintained by all the bumps on the network. An agreement medium ensures that the creation and modification of data are agreed upon by all the bumps or the maturity of the bumps. Using this fashion the blockchain has the features of high security, not easy to be tampered with, and so on

2. RELATED WORK Identity management systems authenticate, authorize and identify users. Many private institutes or government organizations need personal information from users to provide them with the required services. Traditionally this information is stored in centralized databases. Centralized databases are prone to data breaches and the users had minimal or no control over their information. The lack of transparency causes privacy issues in the identity verification process. With the emergence of Bitcoin, blockchain technology has started entering all the areas of global business. With its strong features such as distributed ledger, immutability, and transparency, blockchain technology is a new approach to identity management systems. Due to decentralization, the users have more control over their identity and there is no centralized authority.

Key Words: Blockchain; IPFS; Ethereum; Privacy; Hashing; Identity Management;

1. INTRODUCTION Data leaks or identity fraud (e.g., stealing of credentials or credit card in- conformation) frequently affect profitable loss and drop of trust in the identity providers. Within this environment, new identity operation results that satisfy the factual requirements must be explored. The particular data is traditionally stored in a centralized system, which makes it possible for hackers or bushwhackers to achieve their vicious pretensions by robbery/ misusing/ manipulating these data in this centralized system [1]. To gain access to the services handed by these online operations, the customers must validate their identity by giving a valid identifier. This identifier can take numerous forms similar to particular information contained on a

© 2022, IRJET

|

Impact Factor value: 7.529

|

ISO 9001:2008 Certified Journal

|

Page 416


Turn static files into dynamic content formats.

Create a flipbook