{"id":"https://openalex.org/W4406416810","doi":"https://doi.org/10.1109/ic3i61595.2024.10829044","title":"Blockchain-Based Identity Management: Enhancing Privacy and Security in Digital Identity System","display_name":"Blockchain-Based Identity Management: Enhancing Privacy and Security in Digital Identity System","publication_year":2024,"publication_date":"2024-09-18","ids":{"openalex":"https://openalex.org/W4406416810","doi":"https://doi.org/10.1109/ic3i61595.2024.10829044"},"language":"en","primary_location":{"id":"doi:10.1109/ic3i61595.2024.10829044","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ic3i61595.2024.10829044","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 7th International Conference on Contemporary Computing and Informatics (IC3I)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100659284","display_name":"S. Saranya","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"S Saranya","raw_affiliation_strings":["Dr. N.G.P. Institute of Technology,Computer Science and Engineering,Coimbatore"],"affiliations":[{"raw_affiliation_string":"Dr. N.G.P. Institute of Technology,Computer Science and Engineering,Coimbatore","institution_ids":[]}]},{"author_position":"middle","author":{"id":null,"display_name":"Monika","orcid":null},"institutions":[{"id":"https://openalex.org/I4388482725","display_name":"Mangalmay Institute of Management and Technology","ror":"https://ror.org/051twmj48","country_code":null,"type":"education","lineage":["https://openalex.org/I4388482725"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Monika","raw_affiliation_strings":["Mangalmay Institute of Management and Technology,Greater Noida,India"],"affiliations":[{"raw_affiliation_string":"Mangalmay Institute of Management and Technology,Greater Noida,India","institution_ids":["https://openalex.org/I4388482725"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100773443","display_name":"K. Manikandan","orcid":null},"institutions":[{"id":"https://openalex.org/I876193797","display_name":"Vellore Institute of Technology University","ror":"https://ror.org/00qzypv28","country_code":"IN","type":"education","lineage":["https://openalex.org/I876193797"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"K Manikandan","raw_affiliation_strings":["Vellore Institute of Technology (VIT),School of Computer Science &#x0026; Engineering (SCOPE),Vellore,Tamilnadu,India,632014"],"affiliations":[{"raw_affiliation_string":"Vellore Institute of Technology (VIT),School of Computer Science &#x0026; Engineering (SCOPE),Vellore,Tamilnadu,India,632014","institution_ids":["https://openalex.org/I876193797"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074697797","display_name":"Jangam Nagaraju","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jangam Nagaraju","raw_affiliation_strings":["MLR Institute of Technology, Dundigal,Department of Data Science,Hyderabad"],"affiliations":[{"raw_affiliation_string":"MLR Institute of Technology, Dundigal,Department of Data Science,Hyderabad","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5115939829","display_name":"S. Nagendiran","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"S. Nagendiran","raw_affiliation_strings":["R. M. K. Engineering College,Department of Artificial Intelligence and Data Science"],"affiliations":[{"raw_affiliation_string":"R. M. K. Engineering College,Department of Artificial Intelligence and Data Science","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5062181201","display_name":"B. T. Geetha","orcid":null},"institutions":[{"id":"https://openalex.org/I85461943","display_name":"Saveetha University","ror":"https://ror.org/0034me914","country_code":"IN","type":"education","lineage":["https://openalex.org/I85461943"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"B. T. Geetha","raw_affiliation_strings":["Saveetha University,Saveetha School of Engineering (SIMATS),Department of ECE,Tamil Nadu,India"],"affiliations":[{"raw_affiliation_string":"Saveetha University,Saveetha School of Engineering (SIMATS),Department of ECE,Tamil Nadu,India","institution_ids":["https://openalex.org/I85461943"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5100659284"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.7557,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.82180396,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1620","last_page":"1625"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9887999892234802,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/identity-management","display_name":"Identity management","score":0.8571164608001709},{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.7748059034347534},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.687727689743042},{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.6759628653526306},{"id":"https://openalex.org/keywords/digital-identity","display_name":"Digital identity","score":0.6013327240943909},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5681586861610413},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.5623522996902466},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4691416621208191},{"id":"https://openalex.org/keywords/identity-theft","display_name":"Identity theft","score":0.4605931043624878},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.3286460041999817},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.17571812868118286}],"concepts":[{"id":"https://openalex.org/C555379026","wikidata":"https://www.wikidata.org/wiki/Q977772","display_name":"Identity management","level":3,"score":0.8571164608001709},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.7748059034347534},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.687727689743042},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.6759628653526306},{"id":"https://openalex.org/C2779813694","wikidata":"https://www.wikidata.org/wiki/Q528053","display_name":"Digital identity","level":3,"score":0.6013327240943909},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5681586861610413},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.5623522996902466},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4691416621208191},{"id":"https://openalex.org/C522325796","wikidata":"https://www.wikidata.org/wiki/Q471880","display_name":"Identity theft","level":2,"score":0.4605931043624878},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.3286460041999817},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.17571812868118286},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ic3i61595.2024.10829044","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ic3i61595.2024.10829044","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 7th International Conference on Contemporary Computing and Informatics (IC3I)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Reduced inequalities","id":"https://metadata.un.org/sdg/10","score":0.41999998688697815}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W2984994118","https://openalex.org/W3033451189","https://openalex.org/W3035518953","https://openalex.org/W3086013780","https://openalex.org/W3123658637","https://openalex.org/W3194023517","https://openalex.org/W4220723727","https://openalex.org/W4281568726","https://openalex.org/W4285113672","https://openalex.org/W4292212790","https://openalex.org/W4310676120","https://openalex.org/W4312810470","https://openalex.org/W4313591413","https://openalex.org/W4377013527","https://openalex.org/W4385627158"],"related_works":["https://openalex.org/W4308433763","https://openalex.org/W3110872243","https://openalex.org/W2898512050","https://openalex.org/W4402073113","https://openalex.org/W4236961386","https://openalex.org/W4386213623","https://openalex.org/W4385282342","https://openalex.org/W2150958676","https://openalex.org/W4246096667","https://openalex.org/W2909824350"],"abstract_inverted_index":{"Privacy":[0],"and":[1,52,63,77,90,102,126,140,171],"security":[2],"are":[3,84],"major":[4],"concerns":[5],"when":[6],"it":[7,38,150],"comes":[8],"to":[9,59,67,86,144],"digital":[10,46],"identities,":[11],"particularly":[12,159],"in":[13,26],"centralized":[14,120],"systems":[15,97,114],"where":[16,23],"data":[17,124],"can":[18,31,74,151],"be":[19,32],"easily":[20],"hacked":[21],"or":[22],"people":[24],"engage":[25],"identity":[27,47,112,160],"fraud.":[28,128],"These":[29],"issues":[30],"addressed":[33],"using":[34],"blockchain":[35,73,88,96,173],"technology":[36],"since":[37],"allows":[39],"for":[40],"the":[41,61,64,69,91,94,107,116,119,133,137,154,167],"creation":[42],"of":[43,118,135,142,169],"a":[44],"decentralized":[45],"that":[48,110,156],"is":[49],"both":[50],"secure":[51,172],"tamper-proof.":[53],"This":[54],"study":[55,108],"employs":[56],"Kaggle":[57],"dataset":[58],"document":[60],"transactions":[62],"devices":[65],"involved":[66],"make":[68],"distinctions":[70],"on":[71,132],"how":[72,149],"boost":[75],"privacy":[76],"security.":[78],"Predominantly,":[79],"various":[80],"machine":[81],"learning":[82],"algorithms":[83,143],"used":[85],"analyze":[87],"applications,":[89],"results":[92],"emphasize":[93],"fact":[95],"greatly":[98],"enhance":[99],"transaction":[100],"viability":[101],"diminish":[103],"fraudulent":[104],"actions.":[105],"Therefore,":[106],"argues":[109],"blockchain-based":[111],"management":[113],"offset":[115],"shortcomings":[117],"model":[121],"by":[122],"enhancing":[123],"ownership":[125],"combating":[127],"Subsequent":[129],"analysis":[130],"expanded":[131],"discussion":[134],"elaborating":[136],"scalability,":[138],"interoperability,":[139],"application":[141],"blockchains":[145],"as":[146,148],"well":[147],"fundamentally":[152],"change":[153],"way":[155],"certain":[157],"industries,":[158],"management,":[161],"would":[162],"work":[163],"with":[164],"consumers":[165],"at":[166],"center":[168],"reliable":[170],"solutions.":[174]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-04-16T08:26:57.006410","created_date":"2025-10-10T00:00:00"}
