Blockchain Technology the Identity Management and Authentication Service Disruptor: A Survey
Abstract
Keywords
Full Text:
PDFReferences
Nakamoto, S., Bitcoin: A Peer-to-Peer Electronic Cash System. 2008.
Wood, G., Ethereum: A Secure Decentralised Generalised Transaction Ledger EIP-150 Revision. 2014.
Swan, M., Blockchain: Blueprint for a new economy. 2015: O'Reilly Media, Inc.
Alizadeh Mojtaba, A.S., Zamani Mazdak, Baharun Sabariah, Sakurai Kouichi, Authentication in mobile cloud computing: A survey. Journal of Network and Computer Applications, 2016. 61: p. 59-80.
Shu Yun Lim, M.L.M.K., Tan Fong Ang, Security Issues and Future Challenges of Cloud Service Authentication. Acta Polytechnica Hungarica, 2017. 14(2): p. 69-89.
TheStar, M’sia sees biggest mobile data breach, in TheStar. 2017.
MalaysiaKini, After data leaks, Personal Data Protection Act needs review, in Malaysia Kini. 2018.
Nagaraju, S. and L. Parthiban, SecAuthn: Provably Secure Multi-Factor Authentication for the Cloud Computing Systems. Indian Journal of Science and Technology, 2016. 9(9).
Ghazizadeh E., M., J. L. A., Zamani, M., Pashang, A. A survey on security issues of federated identity in the cloud computing. in Cloud Computing Technology and Science (CloudCom), 2012 IEEE 4th International Conference on. 2012.
Meredith, S., Facebook-Cambridge Analytica: A timeline of the data hijacking scandal. 2018, CNBC.
Andrew Tobin, D.R., The Inevitable Rise of Self-Sovereign Identity. 2017.
Simon, H. SAML: The Secret to Centralized Identity Management. 2004.
Zwattendorfer, B., et al., A Federated Cloud Identity Broker-Model for Enhanced Privacy via Proxy Re-Encryption, in Communications and Multimedia Security, B. De Decker and A. Zúquete, Editors. 2014, Springer Berlin Heidelberg. p. 92-103.
Andrew Tobin, D.R., The Inevitable Rise of Self-Sovereign Identity (White paper). 2017: Sovrin Foundation.
M I Awang, M.A.M., R R Mohamed, A Ahmad, N A Rawi, A Pattern-Based Password Authentication Scheme for Minimizing Shoulder Surfing Attack. International Journal on Advanced Science, Engineering and Information Technology, 2017. 7(3).
Keszthelyi , A., About Passwords. Acta Polytechnica Hungarica, 2013. Vol. 10, No. 6.
Recordon, D. and B. Fitzpatrick, OpenID Authentication 1.1. Finalized OpenID Specification, May, 2006.
Celesti, A., et al. Three-Phase Cross-Cloud Federation Model: The Cloud SSO Authentication. in Advances in Future Internet (AFIN), 2010 Second International Conference on. 2010.
Senk, C., Future of Cloud-Based Services for Multi-factor Authentication: Results of a Delphi Study, in Cloud Computing, M. Yousif and L. Schubert, Editors. 2013, Springer International Publishing. p. 134-144.
Chaurasia, B., A. Shahi, and S. Verma, Authentication in Cloud Computing Environment Using Two Factor Authentication, in Proceedings of the Third International Conference on Soft Computing for Problem Solving, M. Pant, et al., Editors. 2014, Springer India. p. 779-785.
Banyal, R.K., P. Jain, and V.K. Jain. Multi-factor Authentication Framework for Cloud Computing. in Computational Intelligence, Modelling and Simulation (CIMSim), 2013 Fifth International Conference on. 2013.
Imran Naguru, N.K.R.B., Feature Matching in Iris Recognition System using MATLAB. International Journal on Advanced Science, Engineering and Information Technology, 2017. 7(5).
Hahn, C. and J. Hur, Efficient and privacy-preserving biometric identification in cloud. ICT Express, 2016. 2(3): p. 135-139.
Rathgeb, C. and A. Uhl, A survey on biometric cryptosystems and cancelable biometrics. EURASIP Journal on Information Security, 2011. 2011(1): p. 3.
Markus Jakobsson, E.S., Philippe Golle, Richard Chow, Implicit authentication for mobile devices, in Proceedings of the 4th USENIX conference on Hot topics in security. 2009, USENIX Association: Montreal, Canada. p. 9-9.
Jeong, H. and E. Choi, User Authentication using Profiling in Mobile Cloud Computing. Aasri Conference on Power and Energy Systems, 2012. 2: p. 262-267.
Chow, R., et al., Authentication in the clouds: a framework and its application to mobile users, in Proceedings of the 2010 ACM workshop on Cloud computing security workshop. 2010, ACM: Chicago, Illinois, USA. p. 1-6.
Ismail, R., Enhancement of Online Identity Authentication Though Blockchain Technology. 2017: Malaysia.
Aaron Wright, P.D.F., Decentralized Blockchain Technology and the Rise of Lex Cryptographia. 2015.
Vukolić, M., The Quest for Scalable Blockchain Fabric: Proof-of-Work vs. BFT Replication, in Open Problems in Network Security. iNetSec 2015. Lecture Notes in Computer Science. 2016, Springer.
M. Ali, R.S., J. Nelson and M. J. Freedman, Blockstack: A New Internet for Decentralized Applications (Whitepaper). 2017.
J. Nelson, M.A., R. Shea and M. J. Freedman, Extending Existing Blockchains with Virtualchain, in Workshop on Distributed Cryptocurrencies and Consensus Ledgers. 2016.
M. Ali, J.N., R. Shea and M. J. Freedman. Blockstack: A Global Naming and Storage System Secured by Blockchains. in 2016 USENIX Annual Technical Conference. 2016.
Atzori, M., Blockchain technology and decentralized governance: Is the state still necessary? 2015.
Foundation, T.L., Hyperledger Overview. 2018.
Jesse Leimgruber, A.M., John Backus, Bloom Protocol: Decentralized credit scoring powered by Ethereum and IPFS. 2018.
Shocard, Identity Management Verified Using the Blockchain. 2017.
Christian Lundkvist, R.H., Joel Torstensson, Zac Mitton, Michael Sena, UPORT: A Platform for Self-Sovereign Identity. 2016.
Digital, I.O., I/O Digital Application Based Blockchain Whitepaper. 2016.
BlockAuth, Powering a franchised network of OpenID Connect providers that verify user authentication and authenticity. 2014.
Uniquid. Uniquid Blockchain Access Management. 2017; Available from: http://uniquid.com/.
Charleen Fei, J.L., Eugeniu Rusu,Kasia Szawan, Kai Wagner, Natascha Wittenberg, Jolocom: Decentralization By Design. 2018.
Blockchain, C. Identity compliance, simplified. 2018; Available from: https://www.cambridge-blockchain.com/.
Legal, K. Blockchain identity verification. 2018; Available from: https://kyc.legal/en.
Conner Fromknecht, D.V., Sophia Yakoubov CertCoin: A NameCoin Based Decentralized Authentication System. 2014.
Authenteq. Identity Verification & KYC. 2018; Available from: https://authenteq.com/.
Samaniego, M., & Deters, R. . Blockchain as a Service for IoT. in IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). 2016. IEEE.
Kirk, J. Blockchain for Identity Management: It's Years Away. 2018 [cited 2018; Available from: https://www.bankinfosecurity.com/blockchain-for-identity-management-its-years-away-a-10598.
NameCoin. Namecoin. 2018; Available from: https://www.namecoin.org/.
DOI: http://dx.doi.org/10.18517/ijaseit.8.4-2.6838
Refbacks
- There are currently no refbacks.
Published by INSIGHT - Indonesian Society for Knowledge and Human Development