Reimagining Digital Identity: A Comparative Analysis of Advanced Identity Access Management (IAM) Frameworks Leveraging Blockchain Technology for Enhanced Security, Decentralized Authentication, and Trust-Centric Ecosystems
Keywords:
Identity Access Management (IAM), Blockchain Technology, Self-Sovereign Identity (SSI)Abstract
Links, applications, and services require solid IAM solutions as they grow online. Centralized IAM systems often include security flaws, data silos, and single points of failure. This vulnerability attracts identity theft, unauthorized access, and online mistrust. Blockchain's distributed ledger, immutability, and transparency may revolutionize IAM.
The interaction between sophisticated IAM systems and blockchain technology is studied. Blockchain's primary functionalities enable secure, decentralized identification systems that prevent digital identity theft.
References
J. Camenisch and G. Zaverucha, "Ingredient-Hiding and Threshold Signatures," in Advances in Cryptology - EUROCRYPT 2007, vol. 4432, pp. 106–125, Springer, Berlin, Heidelberg, 2007, doi: 10.1007/978-3-540-72599-2_7.
M. Chase and A. Lysyanskaya, "On Signatures from Randomness," in Advances in Cryptology - EUROCRYPT 2004, vol. 3027, pp. 460–477, Springer, Berlin, Heidelberg, 2004, doi: 10.1007/978-3-540-25907-6_27.
D. Chen et al., "Decentralized Identity Management: Exploring the Next Stage of Web Evolution," IEEE Access, vol. 6, pp. 67449-67473, 2018, doi: 10.1109/ACCESS.2018.2875842.
X. Chen et al., "Towards Privacy-Preserving Revocable Identity-Based Encryption," in International Conference on Security in Communication and Information Systems, pp. 108–122, Springer, Berlin, Heidelberg, 2013, doi: 10.1007/978-3-642-39806-4_8.
J. Deng et al., "Identity-Based Cryptography for Diffie-Hellman Groups with Short Exponents," in CRYPTO 2002, vol. 2442, pp. 144–160, Springer, Berlin, Heidelberg, 2002, doi: 10.1007/3-540-44983-0_9.
I. Dimitriou and A. Levendosky, "Public Key Infrastructure (PKI) Security: Analysis Using Attack Trees," in **2010 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) **IEEE, pp. 1643-1648, 2010, doi: 10.1109/TrustCom.2010.184.
M. Du et al., "Revocable Identity-Based Encryption: Definitions, Constructions, and Applications," in Public Key Cryptography - PKC 2004, vol. 3027, pp. 478–490, Springer, Berlin, Heidelberg, 2004, doi: 10.1007/978-3-540-25907-6_28.
J. Ellul et al., "A Novel Blockchain-Based Digital Identity Management System for Service-Oriented Architectures," IEEE Access, vol. 6, pp. 12395-12404, 2018, doi: 10.1109/ACCESS.2018.2
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.