Alanzi et al., 2022 - Google Patents
Towards improving privacy and security of identity management systems using blockchain technology: A systematic reviewAlanzi et al., 2022
View HTML- Document ID
- 14483952930175356078
- Author
- Alanzi H
- Alkhatib M
- Publication year
- Publication venue
- Applied Sciences
External Links
Snippet
An identity management system (IDMS) manages and organizes identities and credentials information exchanged between users, identity providers (IDPs), and service providers (SPs) to ensure confidentiality and enhance privacy of users' personal data. Traditional or …
- 238000005516 engineering process 0 title abstract description 71
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/08—Access security
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Wenhua et al. | Blockchain technology: security issues, healthcare applications, challenges and future trends | |
Almaiah et al. | A novel hybrid trustworthy decentralized authentication and data preservation model for digital healthcare IoT based CPS | |
Jia et al. | IRBA: An identity-based cross-domain authentication scheme for the internet of things | |
Kwon et al. | WSN-SLAP: Secure and lightweight mutual authentication protocol for wireless sensor networks | |
Zaidi et al. | An attribute-based access control for IoT using blockchain and smart contracts | |
Hisseine et al. | The application of blockchain in social media: a systematic literature review | |
Asif et al. | Blockchain-based authentication and trust management mechanism for smart cities | |
Alanzi et al. | Towards improving privacy and security of identity management systems using blockchain technology: A systematic review | |
Hong et al. | Vaultpoint: A blockchain-based SSI model that complies with OAuth 2.0 | |
Qureshi et al. | A blockchain-based efficient, secure and anonymous conditional privacy-preserving and authentication scheme for the internet of vehicles | |
Alzahrani et al. | A privacy preserving authentication scheme for roaming in IoT-based wireless mobile networks | |
Choi et al. | Scalable and secure internet of things connectivity | |
Chung et al. | An enhanced lightweight anonymous authentication scheme for a scalable localization roaming service in wireless sensor networks | |
Bai et al. | Health-zkIDM: a healthcare identity system based on fabric blockchain and zero-knowledge proof | |
Alsayegh et al. | Towards secure searchable electronic health records using consortium blockchain | |
Kim et al. | Secure and privacy-preserving authentication scheme using decentralized identifier in metaverse environment | |
Bai et al. | Self-sovereignty identity management model for smart healthcare system | |
Sylla et al. | Blockchain-based context-aware authorization management as a service in iot | |
Almuhaideb et al. | A lightweight three-factor authentication scheme for WHSN architecture | |
Gupta et al. | Secure and lightweight authentication protocol for privacy preserving communications in smart city applications | |
Kim et al. | Digital Authentication System in Avatar Using DID and SBT | |
Lansky et al. | BCmECC: A lightweight blockchain-based authentication and key agreement protocol for Internet of Things | |
Kihara et al. | Security and performance of single sign-on based on one-time pad algorithm | |
Kallapu et al. | Enhancing cloud communication security: a blockchain-powered framework with attribute-aware encryption | |
Lee et al. | Blockchain-based data access control and key agreement system in iot environment |