A Review on Identity Safety Using Block chain

Authors

  • Ansuman Samal Department of Management Siksha ‘O’ Anusandhan (Deemed to be University), Bhubaneswar Author
  • Bibhuti B Pradhan Department of Management Siksha ‘O’ Anusandhan (Deemed to be University), Bhubaneswar Author

DOI:

https://doi.org/10.61841/7fewf179

Keywords:

Digital Identity, Identity Management, Block chain, Privacy, Bit coin, Personal data

Abstract

Frequent cases of different information spillage has brought again into the center of security issues with the diverse personality sharing components. A client is required to give his own personality to confirm by various offices. The KYC systems which are utilized by the banks is totally reliant on the encryption which is moderate and it can prompt the loss of client subtleties to different theirs gathering budgetary foundations. This system can be proficient by utilizing the Block chain innovation, which can possibly mechanize a heap of manual procedure and it is additionally impervious to hacks of any kind. The permanent block chain block and its conveyed record is the ideal supplement to the obscure procedure of KYC. With the expansion of the savvy contacts extortion, recognition can be automated. For KYC character subtleties storage, the banks can build up a mutual private block chain inside the bank premises and the equivalent can be utilized for checking the archives. This permits the client to oversee their touchy reports and furthermore makes it simpler for banks to get the records they require for consistency.

Downloads

Download data is not yet available.

References

[1] D. Baars, H. Moonen, M. Van Sinderen, R. Steenbergen, and R. Nederland, “Towards Self-Sovereign Identity using Blockchain Technology.”

[2] “A BLOCKCHAIN IDENTITY.”

[3] B. Cresitello-Dittmar, “Application of the Blockchain For Authentication and Verification of Identity,” 2016.

[4] G. Zyskind, O. Nathan, and A. ’ Sandy’ Pentland, “Decentralizing Privacy: Using Blockchain to Protect

Personal Data,” 2015, doi: 10.1109/SPW.2015.27.

[5] A. Ghulam Nabi Zurich, S. Rafati Niya, and T. Bocek, “Comparative Study on Identity Management Methods Using Blockchain,” 2017.

[6] “Identity Secured Sharing Using Blockchain.”

[7] R. Zhang, R. Xue, and L. Liu, “Security and Privacy on Blockchain,” ACM Comput. Surv. 1, 1, Artic., vol. 1, p. 35, 2019, doi: 10.1145/3316481.

[8] S. El Haddouti and M. D. Ech-Cherif El Kettani, “Analysis of identity management systems using blockchain technology,” in Proceedings - 2019 International Conference on Advanced Communication Technologies and Networking, CommNet 2019, 2019, doi: 10.1109/COMMNET.2019.8742375.

[9] M. Aydar and S. Ayvaz, “Towards a Blockchain based digital identity verification, record attestation and record sharing system,” Jun. 2019.

[10] J. Zanol, A. Czadilek, and K. Lebloch, “Self-sovereign identity und blockchain,” Jusletter IT, no. February, 2018.

Downloads

Published

06.11.2019

How to Cite

Samal, A. ., & Pradhan, B. B. . (2019). A Review on Identity Safety Using Block chain . International Journal of Psychosocial Rehabilitation, 23(6), 31-36. https://doi.org/10.61841/7fewf179