A blockchain-based Aadhar system: distributed authentication system

نویسندگان

چکیده

An Aadhaar is a unique number issued to every citizen in India. Aadhar’s current identity authentication relies on the central identities data repository (CDIR) of identification authority India (UIDAI), which at risk single-point fault attack. Perhaps worse, internal attacks can tamper with sensitive authenticated devices without being detected. In this paper, proposed system utilizes emerging technology: blockchain for solving issue centralized authentication. The provides distributed, secure, and tamper-proof ledger platform Aadhar that implemented using ethereum technology. considers (ID) each registered it smart contract so ID may be by other peer-to-peer network authority. For securing data, framework uses hashing technique significant (i.e. firmware). Blockchain stores hashed instantly any change state possible detect.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Distributed Authentication Model for an E-Health Network Using Blockchain

Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...

متن کامل

A Distributed Authentication Model for an E-Health Network Using Blockchain

Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...

متن کامل

Veins based Authentication System

Biometric system such as finger, face, iris, ear, voice, DNA etc. is used for personal identification. Authentication based on vein pattern is an approach that uses the vast network of blood vessels that lie underneath a skin on back of the hand. Vein pattern are unique and also difficult to duplicate. In this paper, we present an approach to identify the user using hand vein pattern and knuckl...

متن کامل

DIBAS: Distributed, Integrated Biometric Authentication System

Increasing the level of security in critical or "high-value" buildings is becoming a great concern in today's increasingly security aware society. Building access control represents an important tool for enhancing security by reducing the likelihood that malicious persons can even enter a critical structure. Existing access control solutions rely on key cards as a mechanism for identifying one ...

متن کامل

Lelantos: A Blockchain-based Anonymous Physical Delivery System

Real world physical shopping offers customers the privilege of maintaining their privacy by giving them the option of using cash, and thus providing no personal information such as their names and home addresses. On the contrary, electronic shopping mandates the use of all sorts of personally identifiable information for both billing and shipping purposes. Cryptocurrencies such as Bitcoin have ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: TELKOMNIKA Telecommunication Computing Electronics and Control

سال: 2022

ISSN: ['1693-6930', '2302-9293']

DOI: https://doi.org/10.12928/telkomnika.v20i6.24231