Related references
Note: Only part of the references are listed.
Article
Engineering, Multidisciplinary
A. Shobanadevi et al.
Summary: Blockchain is a system that records information in a secure and transparent way through decentralized credentials and user identity management solutions. It provides higher data security and efficiency for personal identity management, eliminating the need for third party intermediaries in data transactions.
INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT
(2022)
Article
Multidisciplinary Sciences
Xia Feng et al.
Summary: In this paper, an efficient blockchain-based authentication scheme for secure communication in VANET (EBAS) is proposed. The scheme utilizes digital certificates and encryption techniques to manage vehicle identities, and introduces a transaction update mechanism and anonymous participation to enhance efficiency and protect privacy.
Article
Chemistry, Analytical
A. F. M. Suaib Akhter et al.
Summary: Cooperative communication protocols are effective in enhancing the reliability and transmission range of VANET, but identity verification and communication security must be ensured. A blockchain-based secure authentication protocol is proposed for IoV to optimize system throughput, reduce PDR and delay, suitable for IoVs with limited resources.
Article
Computer Science, Interdisciplinary Applications
Chang Soo Sung et al.
Summary: This study investigates the benefits and challenges of adopting a blockchain-based identity management system in public services through academic literature review and an actual design case. The findings suggest that such systems can improve transparency, accountability, reliability, and administrative efficiency, but implementation can be complex in the government sector. This research emphasizes the importance of exploring beyond technology-driven approaches in government adoption of new technologies to understand implications and improve efficiency.
JOURNAL OF ENTERPRISE INFORMATION MANAGEMENT
(2021)
Article
Computer Science, Information Systems
Yong Zhu et al.
Summary: In the post-cloud era, edge computing is a new computing paradigm that processes data at the edge of the network in real time. It can provide a trusted computing environment for edge computing with the decentralized, tamper-proof, and anonymous features of blockchain technology. However, this also raises concerns about security, privacy, fault tolerance, and how to combine the advantages of both has become a key focus of academic research.
Article
Chemistry, Analytical
Santiago Figueroa-Lorenzo et al.
Summary: The main challenge of the Modbus IIoT protocol lies in security. Existing security solutions have limitations, but a proposed solution based on self-sovereign identity over a blockchain platform offers a decentralized approach to address security concerns effectively.
Article
Computer Science, Information Systems
Luisanna Cocco et al.
Summary: This work presents how a digital identity management system can support food supply chains in guaranteeing the quality of products and compliance with standards. By combining innovative technologies such as Self Sovereign Identity, Blockchain, and Inter Planetary File System, the system aims to ensure eligibility, transparency, and traceability of certifications in a food supply chain.
Article
Computer Science, Information Systems
Tomader Abduaziz Almeshal et al.
Summary: Blockchain technology is a rapidly emerging technology with applications not only limited to cryptocurrency but also impacting various industries. The fair access, transparency, and immutability of blockchain applications have attracted businesses to explore its potential benefits in finance, insurance, government, and other sectors beyond cryptocurrency. Evaluation of blockchain suitability for different business cases has been crucial for successful adoption, leading to the development of diverse evaluation models and frameworks to assist decision-makers in assessing blockchain adoption.
Article
Computer Science, Information Systems
Andreas Gruener et al.
Summary: Traditional identity management patterns have evolved with the invention of blockchain-based Self-Sovereign Identity (SSI) solutions, which prioritize users and enable attribute aggregation by downgrading the identity provider to an attribute provider. However, challenges such as the development of new protocols, disregarding established protocols, and the fragmented landscape of SSI solutions pose obstacles for adoption by service providers.
Article
Computer Science, Information Systems
Ivan Gutierrez-Aguero et al.
Summary: The concept of identity in security and privacy research has become increasingly important with the rise of Blockchain systems, where anonymity and unlinkability are crucial. This new method ensures that digital pseudo identities remain unlinked to real identities, as demonstrated in a case study within the Ethereum context.
Article
Computer Science, Information Systems
Rafael Torres Moreno et al.
Summary: Traditional Identity Management systems face privacy, trust, and security issues, with the European OLYMPUS project proposing a distributed approach based on enhanced Attribute-Based Credentials (ABC). However, trust relationships between service providers, users, and identity providers remain a gap in this privacy-preserving ABC system.
Article
Computer Science, Information Systems
Gyeongjin Ra et al.
Summary: The human internet of things is a promising trend that improves life quality by adopting a user-centered vision, but faces privacy concerns. Blockchain technology can deploy a digital identity management system to alleviate these issues. Verifiable anonymous identity management connects privacy channels between users, achieving identity verification and access control provision.
Proceedings Paper
Computer Science, Information Systems
Jianlin Niu et al.
Summary: A cross-domain self-sovereign identity management scheme using smart contracts was proposed in this study to address issues in existing schemes, with a focus on the entire identity lifecycle and privacy protection on the blockchain. Experimental verification showed that the scheme effectively controlled resource expenditure, had good usability, and outperformed other schemes in terms of controllability, security, and portability.
2020 2ND INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE COMMUNICATION AND NETWORK SECURITY (CSCNS2020)
(2021)
Article
Health Care Sciences & Services
Ibrahim Tariq Javed et al.
Summary: The COVID-19 pandemic has accelerated the development of remote eHealth solutions, with a focus on telehealth, but current centralized identity management systems limit interoperability between users in different eHealth domains. To address this issue, a blockchain-based decentralized identity management system was proposed to ensure transparent and secure identification and authentication across various eHealth domains, providing enhanced security and privacy for patients and healthcare providers. The system utilizes smart contracts on an Ethereum consortium blockchain, with performance metrics analyzed to optimize efficiency and effectiveness.
Article
Computer Science, Information Systems
Lukas Stockburger et al.
Summary: This paper examines how self-sovereign identity management can be used in the public transportation sector, exploring the potential of blockchain-based decentralized systems to provide high-level security and transparency. By developing a low-fidelity prototype showcasing the use of standardized travel credentials across different transportation networks in Europe, the proposed system eliminates the need for multiple travel cards and empowers individuals to have better control over their identities.
BLOCKCHAIN-RESEARCH AND APPLICATIONS
(2021)
Article
Computer Science, Information Systems
Shuang Sun et al.
Summary: This study aims to address issues such as single point of failure in delegate nodes, privacy information leak, and DDoS attacks by minimizing blockchain redundancy to enable more IoT devices to be specialized blockchain nodes. A secure, lightweight, cross-domain blockchain-based IoT access control system is proposed, integrating a permissioned blockchain (HLF), attribute-based access control (ABAC), and identity-based signature (IBS).
Article
Computer Science, Information Systems
Mohammed Amine Bouras et al.
Summary: This paper proposes a consortium blockchain-based identity management solution for addressing privacy, security, and scalability issues in centralized systems for IoT. By measuring latency and throughput of transactions and comparing with other similar works, it is demonstrated that the approach is suitable for business adoption.
Review
Chemistry, Analytical
Mohammed Amine Bouras et al.
Article
Economics
J. Tetzlaff et al.
Article
Computer Science, Hardware & Architecture
Yang Liu et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2020)
Article
Chemistry, Analytical
Charalampos Stamatellis et al.
Article
Computer Science, Information Systems
Xinyin Xiang et al.
Article
Computer Science, Information Systems
Zijian Bao et al.
Article
Computer Science, Information Systems
Tanvir Ferdousi et al.
Article
Computer Science, Information Systems
Hui Li et al.
Article
Chemistry, Multidisciplinary
Jamila Alsayed Kassem et al.
APPLIED SCIENCES-BASEL
(2019)
Article
Computer Science, Information Systems
Shangping Wang et al.
Article
Computer Science, Information Systems
Shangping Wang et al.
Article
Computer Science, Information Systems
Shihan Bao et al.
Article
Computer Science, Information Systems
Pinchen Cui et al.
Article
Computer Science, Information Systems
Chao Lin et al.
Article
Computer Science, Information Systems
Zhaojun Lu et al.
Article
Computer Science, Information Systems
Waleed A. Alrodhan et al.
EURASIP JOURNAL ON INFORMATION SECURITY
(2009)