A blockchain-based Aadhar system: distributed authentication system
نویسندگان
چکیده
An Aadhaar is a unique number issued to every citizen in India. Aadhar’s current identity authentication relies on the central identities data repository (CDIR) of identification authority India (UIDAI), which at risk single-point fault attack. Perhaps worse, internal attacks can tamper with sensitive authenticated devices without being detected. In this paper, proposed system utilizes emerging technology: blockchain for solving issue centralized authentication. The provides distributed, secure, and tamper-proof ledger platform Aadhar that implemented using ethereum technology. considers (ID) each registered it smart contract so ID may be by other peer-to-peer network authority. For securing data, framework uses hashing technique significant (i.e. firmware). Blockchain stores hashed instantly any change state possible detect.
منابع مشابه
A Distributed Authentication Model for an E-Health Network Using Blockchain
Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...
متن کاملA Distributed Authentication Model for an E-Health Network Using Blockchain
Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...
متن کاملVeins based Authentication System
Biometric system such as finger, face, iris, ear, voice, DNA etc. is used for personal identification. Authentication based on vein pattern is an approach that uses the vast network of blood vessels that lie underneath a skin on back of the hand. Vein pattern are unique and also difficult to duplicate. In this paper, we present an approach to identify the user using hand vein pattern and knuckl...
متن کاملDIBAS: Distributed, Integrated Biometric Authentication System
Increasing the level of security in critical or "high-value" buildings is becoming a great concern in today's increasingly security aware society. Building access control represents an important tool for enhancing security by reducing the likelihood that malicious persons can even enter a critical structure. Existing access control solutions rely on key cards as a mechanism for identifying one ...
متن کاملLelantos: A Blockchain-based Anonymous Physical Delivery System
Real world physical shopping offers customers the privilege of maintaining their privacy by giving them the option of using cash, and thus providing no personal information such as their names and home addresses. On the contrary, electronic shopping mandates the use of all sorts of personally identifiable information for both billing and shipping purposes. Cryptocurrencies such as Bitcoin have ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: TELKOMNIKA Telecommunication Computing Electronics and Control
سال: 2022
ISSN: ['1693-6930', '2302-9293']
DOI: https://doi.org/10.12928/telkomnika.v20i6.24231