Blockchain based Secured Multipurpose Identity (SMID) management system for smart cities
Abstract
Blockchain, the decentralized architecture and distributed public ledger technology
that enables Bitcoin, has recently drawn a strong interest from governments, nancial
institutions, and high-tech companies. In modern technological era, blockchain
is intended to provide a secure, irreversible, and transparent information management
platform for practically any application, and it also plays a vital role in establishing
the future of cities. A major number of today's well-known crypto-stages are
based on the Blockchain concept. In today's digital era, Identi cation of an individual
is one of the most important concerns for businesses and many other public
institutions. Digital identity has started playing a vital role in this sector as the
data may be used to identify an individual and his fundamental qualities like name,
address, health status, credit score and others. In this paper, we will look at how
Blockchain can be used to secure digital identities. Digital identity is a trustworthy
idea that describes how people can use or what type of attribute or parameter can
be used to identify someone's identity, as well as the various privacy concepts or
concerns that are related with someone's identity. The identity is used for di erent
kind of application which is typically decentralized and any organization can take
control over the identity data which reasons a large number of identity fraud as well.
The idea is to build a model for single multipurpose identity, which will be secured
using blockchain technology. Instead of several identi cation documents, users can
use this single multipurpose identity to prove their identity in various sectors such
as the government and other private sectors to access particular services. An automated
and real time veri cation of identity through smart contracts can verify
the identity data. The blockchain will provide a tamper-proof method of storing
documents or data that can be audited by the government. User will have control
over which of their credential the service provider can access. Our model will also
ensure that the user can see how his identity data was accessed by multiple vendors
as whenever someone tries to access someone's identity and the user will be able to
see how his identity data was used by looking into it as an individual.