Back to Top

Paper Title

Review on Blockchain-Based Decentralized Identity Management

Authors

Mahesh Sonje
Mahesh Sonje

Article Type

Review Article

Research Impact Tools

Issue

Volume : 11 | Issue : 4

Published On

April, 2024

Downloads

Abstract

This article examines how worldwide organizations are utilizing blockchain technology for decentralized identification (DID) management to enable safe access to information resources. The adoption of blockchain technology for enterprise applications like identity management has been difficult since it was first presented as a cryptocurrency. One of the more compelling use cases for blockchain adoption is DID. In contrast to conventional, central, or federated identity management models, DID use cases assist users across domains and industry pioneers better protect their personal data and application access control. The authors of this exploratory work use qualitative secondary case-based study research approach to comprehend the difficulties facing the existing state of digital identity management and investigate the potential advantages of DID as an emerging model for identity management. They thus put out a conceptual cube framework for examining and analyzing different DID systems. making a contribution to digitally secure identification theory and practice. Blockchain-based decentralized identity management offers a viable way to increase the scalability and security of healthcare systems. customary identity Because management systems are centralized, they are non-scalable, prone to attacks and data breaches, and a single point of failure. On the other hand, private can be protected while ensuring safe and transparent access to patient data using decentralized identity management built on the blockchain.With this method, patients maintain control over their personal health information while allowing medical staff to access certain data as necessary. We suggest BDIMHS, a permissioned blockchain-based decentralized identity management system for healthcare systems that integrates Hyperledger Aries and Hyperledger Indy. Further explanations of the necessary features are created, and high-level protocols for network startup, enrollment, registration, issuance, verification, and revocation are provided. features. With the use of selective disclosure, zero-knowledge proofs, decentralized identifiers, verifiable credentials, and zero-knowledge proofs, the suggested method enhances data security, privacy, immutability, interoperability, and patient autonomy. We also assess the security and performance of the suggested solution and talk about possible implementation issues in the healthcare industry.

View more >>

Uploded Document Preview