Blockchain-Based Identity Management in Decentralized Applications

Authors

  • Sunil Anasuri Independent Researcher, USA. Author
  • Guru Pramod Rusum Independent Researcher, USA. Author
  • kiran Kumar Pappula Independent Researcher, USA. Author

DOI:

https://doi.org/10.63282/3050-9416.IJAIBDCMS-V3I3P109

Keywords:

Blockchain, Identity Management, Decentralized Applications, Self-Sovereign Identity, Verifiable Credentials, Decentralized Identifiers, Smart Contracts, Security, Privacy

Abstract

The emergence of decentralized applications (dApps) has posed a challenge to the current identity management system, which is often centralized authority, mostly exposed to security breaches, information silos, and poor control of users. Blockchain technology introduces a disruptive technology with its decentralized, transparent and tamper-proof architecture, which can usher in new solutions to digital identity. The paper is an investigation of blockchain-based identity management systems, their architecture, working life cycle and dApp integration with identity management solutions. It explores three prominent identity frameworks, centralized, federated, and self-sovereign identity (SSI), and puts blockchain in the group of the very drivers of user-centric and verifiable identity resolutions. The analysis of smart contracts applied to identity operations, consensus mechanisms used in establishing trust, and numerous security and privacy improvements, such as zero-knowledge proofs, is discussed. The potential of blockchain-based identity can be seen in terms of its use in real-world business processes in the areas of decentralized finance (DeFi), healthcare data sharing, and supply chain management. Moreover, the document argues about the use of interoperability mechanisms like Decentralized Identifiers (DIDs) or Verifiable Credentials (VCs), and covers the most important points of scalability, compliance considerations, and trans-chain identity management. The future research directions, such as AI-powered verification, quantum-resistant protocols, or wider ecosystem adoption, are discussed as well. The research behind this project aims to provide a detailed background for scholars and practitioners who wish to implement safe, productive, and privacy-protected identity management in decentralised digital environments

References

1. Pranadeep Katari, Srinivasan Venkataramanan, Tanzeem Ahmad, Venkat Alluri, Amit Kumar Reddy. Decentralizing Trust: A Framework Analysis of Blockchain Based IAM Systems for Secure and Autonomous Digital Identities. Int. J. Intelligent Systems and Applications in Engineering, Vol. 6 No. 4, pp. 336–346, 2018.

2. Zwattendorfer, B., Zefferer, T., & Stranacher, K. (2014, April). An overview of cloud identity management models. In International Conference on Web Information Systems and Technologies (Vol. 2, pp. 82-92). SciTePress.

3. Pöhn, D., & Hommel, W. (2020, September). IMC: A classification of identity management approaches. In European Symposium on Research in Computer Security (pp. 3-20). Cham: Springer International Publishing.

4. Keltoum Bendiab; Nicholas Kolokotronis; Stavros Shiaeles; Samia Boucherkha. A Novel Blockchain based Trust Model for Cloud Identity Management. arXiv preprint, March 2019.

5. Liu, Y., He, D., Obaidat, M. S., Kumar, N., Khan, M. K., & Choo, K. K. R. (2020). Blockchain-based identity management systems: A review. Journal of network and computer applications, 166, 102731.

6. Arnab Chatterjee, Yash Pitroda, Manojkumar Parmar. Dynamic Role Based Access Control for Decentralized Applications. arXiv preprint arXiv:2002.05547, 13 February 2020.

7. Gilani, K., Bertin, E., Hatin, J., & Crespi, N. (2020, September). A survey on blockchain-based identity management and decentralized privacy for personal data. In 2020, 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS) (pp. 97-101). IEEE.

8. Atzori, M. (2015). Blockchain Technology and Decentralised Governance: Is the State Still Necessary? Available at SSRN 2709713.

9. Pilkington, M. (2016). Blockchain technology: principles and applications. In Research handbook on digital transformations (pp. 225-253). Edward Elgar Publishing.

10. Cao, Y., & Yang, L. (2010, December). A survey of identity management technology. In 2010 IEEE International Conference on Information Theory and Information Security (pp. 287-293). IEEE.

11. Wu, K., Ma, Y., Huang, G., & Liu, X. (2021). A first look at blockchain‐based decentralized applications. Software: Practice and Experience, 51(10), 2033-2050.

12. Cai, W., Wang, Z., Ernst, J. B., Hong, Z., Feng, C., & Leung, V. C. (2018). Decentralized applications: The blockchain-empowered software system. IEEE Access, 6, 53019-53033.

13. Zhang, J., Zhong, S., Wang, T., Chao, H. C., & Wang, J. (2020). Blockchain-based systems and applications: a survey. Journal of Internet Technology, 21(1), 1-14.

14. Dib, O., & Rababah, B. (2020). Decentralized identity systems: Architecture, challenges, solutions and future directions. Annals of Emerging Technologies in Computing (AETiC), 4(5), 19-40.

15. Javed, I. T., Alharbi, F., Bellaj, B., Margaria, T., Crespi, N., & Qureshi, K. N. (2021, June). Health-ID: A blockchain-based decentralized identity management for remote healthcare. In Healthcare (Vol. 9, No. 6, p. 712). MDPI.

16. Sung, C. S., & Park, J. Y. (2021). Understanding of blockchain-based identity management system adoption in the public sector. Journal of Enterprise Information Management, 34(5), 1481-1505.

17. Loic Lesavre; Priam Varin; Peter Mell; Michael Davidson; James Shook. A Taxonomic Approach to Understanding Emerging Blockchain Identity Management Systems. arXiv preprint, August 2019.

18. Bouras, M. A., Lu, Q., Dhelim, S., & Ning, H. (2021). A lightweight blockchain-based IoT identity management approach. Future Internet, 13(2), 24.

19. Lone, A. H., & Mir, R. N. (2019). Consensus protocols as a model of trust in blockchains. International Journal of Blockchains and Cryptocurrencies, 1(1), 7-21.

20. Lashkari, B., & Musilek, P. (2021). A comprehensive review of blockchain consensus mechanisms. IEEE Access, 9, 43620-43652.

21. Pappula, K. K., & Rusum, G. P. (2020). Custom CAD Plugin Architecture for Enforcing Industry-Specific Design Standards. International Journal of AI, BigData, Computational and Management Studies, 1(4), 19-28. https://doi.org/10.63282/3050-9416.IJAIBDCMS-V1I4P103

22. Rahul, N. (2020). Vehicle and Property Loss Assessment with AI: Automating Damage Estimations in Claims. International Journal of Emerging Research in Engineering and Technology, 1(4), 38-46. https://doi.org/10.63282/3050-922X.IJERET-V1I4P105

23. Enjam, G. R., & Chandragowda, S. C. (2020). Role-Based Access and Encryption in Multi-Tenant Insurance Architectures. International Journal of Emerging Trends in Computer Science and Information Technology, 1(4), 58-66. https://doi.org/10.63282/3050-9246.IJETCSIT-V1I4P107

24. Pappula, K. K., & Rusum, G. P. (2021). Designing Developer-Centric Internal APIs for Rapid Full-Stack Development. International Journal of AI, BigData, Computational and Management Studies, 2(4), 80-88. https://doi.org/10.63282/3050-9416.IJAIBDCMS-V2I4P108

25. Pedda Muntala, P. S. R. (2021). Integrating AI with Oracle Fusion ERP for Autonomous Financial Close. International Journal of AI, BigData, Computational and Management Studies, 2(2), 76-86. https://doi.org/10.63282/3050-9416.IJAIBDCMS-V2I2P109

26. Rahul, N. (2021). AI-Enhanced API Integrations: Advancing Guidewire Ecosystems with Real-Time Data. International Journal of Emerging Research in Engineering and Technology, 2(1), 57-66. https://doi.org/10.63282/3050-922X.IJERET-V2I1P107

27. Enjam, G. R. (2021). Data Privacy & Encryption Practices in Cloud-Based Guidewire Deployments. International Journal of AI, BigData, Computational and Management Studies, 2(3), 64-73. https://doi.org/10.63282/3050-9416.IJAIBDCMS-V2I3P108

Downloads

Published

2022-10-30

Issue

Section

Articles

How to Cite

1.
Anasuri S, Rusum GP, Pappula kiran K. Blockchain-Based Identity Management in Decentralized Applications. IJAIBDCMS [Internet]. 2022 Oct. 30 [cited 2025 Sep. 28];3(3):70-81. Available from: https://ijaibdcms.org/index.php/ijaibdcms/article/view/238