Nothing Special   »   [go: up one dir, main page]

Alanzi et al., 2022 - Google Patents

Towards improving privacy and security of identity management systems using blockchain technology: A systematic review

Alanzi et al., 2022

View HTML
Document ID
14483952930175356078
Author
Alanzi H
Alkhatib M
Publication year
Publication venue
Applied Sciences

External Links

Snippet

An identity management system (IDMS) manages and organizes identities and credentials information exchanged between users, identity providers (IDPs), and service providers (SPs) to ensure confidentiality and enhance privacy of users' personal data. Traditional or …
Continue reading at www.mdpi.com (HTML) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/08Access security

Similar Documents

Publication Publication Date Title
Wenhua et al. Blockchain technology: security issues, healthcare applications, challenges and future trends
Almaiah et al. A novel hybrid trustworthy decentralized authentication and data preservation model for digital healthcare IoT based CPS
Jia et al. IRBA: An identity-based cross-domain authentication scheme for the internet of things
Kwon et al. WSN-SLAP: Secure and lightweight mutual authentication protocol for wireless sensor networks
Zaidi et al. An attribute-based access control for IoT using blockchain and smart contracts
Hisseine et al. The application of blockchain in social media: a systematic literature review
Asif et al. Blockchain-based authentication and trust management mechanism for smart cities
Alanzi et al. Towards improving privacy and security of identity management systems using blockchain technology: A systematic review
Hong et al. Vaultpoint: A blockchain-based SSI model that complies with OAuth 2.0
Qureshi et al. A blockchain-based efficient, secure and anonymous conditional privacy-preserving and authentication scheme for the internet of vehicles
Alzahrani et al. A privacy preserving authentication scheme for roaming in IoT-based wireless mobile networks
Choi et al. Scalable and secure internet of things connectivity
Chung et al. An enhanced lightweight anonymous authentication scheme for a scalable localization roaming service in wireless sensor networks
Bai et al. Health-zkIDM: a healthcare identity system based on fabric blockchain and zero-knowledge proof
Alsayegh et al. Towards secure searchable electronic health records using consortium blockchain
Kim et al. Secure and privacy-preserving authentication scheme using decentralized identifier in metaverse environment
Bai et al. Self-sovereignty identity management model for smart healthcare system
Sylla et al. Blockchain-based context-aware authorization management as a service in iot
Almuhaideb et al. A lightweight three-factor authentication scheme for WHSN architecture
Gupta et al. Secure and lightweight authentication protocol for privacy preserving communications in smart city applications
Kim et al. Digital Authentication System in Avatar Using DID and SBT
Lansky et al. BCmECC: A lightweight blockchain-based authentication and key agreement protocol for Internet of Things
Kihara et al. Security and performance of single sign-on based on one-time pad algorithm
Kallapu et al. Enhancing cloud communication security: a blockchain-powered framework with attribute-aware encryption
Lee et al. Blockchain-based data access control and key agreement system in iot environment