E-user Verification Using Blockchain

Authors

  • Vismay Yerunkar Student, Department of computer engineering, Pillai HOC College of Engineering and Technology, Rasayani, Maharashtra, India
  • Ashish Sinha Student, Department of computer engineering, Pillai HOC College of Engineering and Technology, Rasayani, Maharashtra, India
  • Vamshi Vadnala Student, Department of computer engineering, Pillai HOC College of Engineering and Technology, Rasayani, Maharashtra, India
  • J.W. Bakal Principal and Faculty, Department of computer engineering, Pillai HOC College of Engineering and Technology, Rasayani, Maharashtra, India

Keywords:

Verification, Authentication, Identification, Blockchain, data management

Abstract

The process of identification is quite hectic and recurring lots of fake identification are created for fraudulent transactions. It is a tedious work of carrying and managing all our documents. E-identity verification is the system which is proposed to make the process of identification easier and faster with one time user identification and then identifying the user based on the saved data. Recently, a new authentication protocol based on blockchain has been proposed to facilitate the sharing and management of IoT devices information in a distributed manner. It is claimed that this protocol ensures both user privacy preservation and security. However, a significant challenge arises due to the direct proportionality between data integrity and the associated costs of communication and computation. A central authority will store user data in a blockchain system, which can later be used to identify the user with their consent. Blockchain-enabled user identification reduces fraud user identification.

References

Pascual A, Marchini K, Miller S. (2018 Feb 6). 2018 Identity fraud: Fraud enters a new era of complexity. [Online]. Javelin Strategy & Research.

Azaria A, Ekblaw A, Vieira T, Lippman A. Medrec: Using blockchain for medical data access and permission management. In IEEE 2016 2nd international conference on open and big data (OBD). 2016 Aug 22; 25–30.

Chen Z, Zhu Y. Personal archive service system using blockchain technology: Case study, promising and challenging. In 2017 IEEE International Conference on AI & Mobile Services (AIMS). 2017 Jun 25; 93–99.

Do HG, Ng WK. Blockchain-based system for secure data storage with private keyword search. In 2017 IEEE World Congress on Services (SERVICES). 2017 Jun 25; 90–93.

Mudliar K, Parekh H, Bhavathankar P. A comprehensive integration of national identity with blockchain technology. In 2018 IEEE International Conference on Communication information and Computing Technology (ICCICT). 2018 Feb 2; 1–6.

Soliman A, Bahri L, Carminati B, Ferrari E, Girdzijauskas S. Diva: Decentralized identity validation for social networks. In Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining. 2015 Aug 25; 383–391.

Zhang L, Li H, Sun L, Shi Z, He Y. Poster: towards fully distributed user authentication with blockchain. In 2017 IEEE Symposium on Privacy-Aware Computing (PAC). 2017 Aug 1; 202–203.

Yli-Huumo J, Ko D, Choi S, Park S, Smolander K. Where is current research on blockchain technology?—a systematic review. PloS one. 2016 Oct 3; 11(10): e0163477.

Yavari M, Safkhani M, Kumari S, Kumar S, Chen CM. An improved blockchain-based authentication protocol for iot network management. Secur Commun Netw. 2020 Oct 26; 2020: 8836214(6p).

Zyskind G, Nathan O. Decentralizing privacy: Using blockchain to protect personal data. In 2015 IEEE Security and Privacy Workshops. 2015 May 21; 180–184.

Published

2023-06-15

How to Cite

[1]
V. . Yerunkar, A. . Sinha, V. . Vadnala, and J. . Bakal, “E-user Verification Using Blockchain”, JoSETTT, vol. 10, no. 1, pp. 20–28, Jun. 2023.