A Review on Identity Safety Using Block chain
DOI:
https://doi.org/10.61841/7fewf179Keywords:
Digital Identity, Identity Management, Block chain, Privacy, Bit coin, Personal dataAbstract
Frequent cases of different information spillage has brought again into the center of security issues with the diverse personality sharing components. A client is required to give his own personality to confirm by various offices. The KYC systems which are utilized by the banks is totally reliant on the encryption which is moderate and it can prompt the loss of client subtleties to different theirs gathering budgetary foundations. This system can be proficient by utilizing the Block chain innovation, which can possibly mechanize a heap of manual procedure and it is additionally impervious to hacks of any kind. The permanent block chain block and its conveyed record is the ideal supplement to the obscure procedure of KYC. With the expansion of the savvy contacts extortion, recognition can be automated. For KYC character subtleties storage, the banks can build up a mutual private block chain inside the bank premises and the equivalent can be utilized for checking the archives. This permits the client to oversee their touchy reports and furthermore makes it simpler for banks to get the records they require for consistency.
Downloads
References
[1] D. Baars, H. Moonen, M. Van Sinderen, R. Steenbergen, and R. Nederland, “Towards Self-Sovereign Identity using Blockchain Technology.”
[2] “A BLOCKCHAIN IDENTITY.”
[3] B. Cresitello-Dittmar, “Application of the Blockchain For Authentication and Verification of Identity,” 2016.
[4] G. Zyskind, O. Nathan, and A. ’ Sandy’ Pentland, “Decentralizing Privacy: Using Blockchain to Protect
Personal Data,” 2015, doi: 10.1109/SPW.2015.27.
[5] A. Ghulam Nabi Zurich, S. Rafati Niya, and T. Bocek, “Comparative Study on Identity Management Methods Using Blockchain,” 2017.
[6] “Identity Secured Sharing Using Blockchain.”
[7] R. Zhang, R. Xue, and L. Liu, “Security and Privacy on Blockchain,” ACM Comput. Surv. 1, 1, Artic., vol. 1, p. 35, 2019, doi: 10.1145/3316481.
[8] S. El Haddouti and M. D. Ech-Cherif El Kettani, “Analysis of identity management systems using blockchain technology,” in Proceedings - 2019 International Conference on Advanced Communication Technologies and Networking, CommNet 2019, 2019, doi: 10.1109/COMMNET.2019.8742375.
[9] M. Aydar and S. Ayvaz, “Towards a Blockchain based digital identity verification, record attestation and record sharing system,” Jun. 2019.
[10] J. Zanol, A. Czadilek, and K. Lebloch, “Self-sovereign identity und blockchain,” Jusletter IT, no. February, 2018.
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.