Decentralized Blockchain-Enabled Employee Authentication System

Decentralized Blockchain-Enabled Employee Authentication System

Bipin Kumar Rai, Pranjal Sharma, Sagar Singhal, Basavaraj S. Paruti
Copyright: © 2023 |Pages: 13
DOI: 10.4018/IJRQEH.323570
Article PDF Download
Open access articles are freely available for download


In recent years, there have been many attempts to introduce blockchain-based identity management solutions, which allow the user to take over control of his/her own identity. In this paper, the authors have reviewed in-depth existing blockchain-based identity management papers and patents published online. Based on that analysis of the literature, a system will be implemented which will come up with the current issues and try to minimize them. Being transparent, immutable, and decentralized in nature, blockchain mechanism is found to be a better technology which can reduce the corruption in the experimental scenario. The objective is to develop a decentralized system which can be used for the verification of the employees in an organization. This is done to stop or reduce the cases of identity theft and data leakage in recent time. This system will be using Ethereum blockchain platform for monitoring the information and smart contract for authentication.
Article Preview

Reason To Focus On Digital Identity

Let us first discuss the reason for the significance of digital identity. Digital Identity has become an integral part of our lives with the rapid expansion of technology. We need to have an account for accessing social media profiles where we have already mentioned all our personal information, such as name, address, phone number, date of birth, mail id, etc. Digital Identity allows us to interact with and use different services available through the internet, such as banking services.

The need to reflect on blockchain identity management benefits emerges from the lack of security generally expected from identity management systems. The shifting of each and everything into the digital age has also created new approaches to identity theft. Therefore, hackers, Fraudsters, and other malicious agents are leveraging the latest identity theft tricks to rob people of their money—moreover, the conventional identity management systems relying on paper-based evidence present concerns such as misappropriation of identity.

Complete Article List

Search this Journal:
Volume 13: 1 Issue (2024)
Volume 12: 2 Issues (2023)
Volume 11: 4 Issues (2022)
Volume 10: 4 Issues (2021)
Volume 9: 4 Issues (2020)
Volume 8: 4 Issues (2019)
Volume 7: 4 Issues (2018)
Volume 6: 4 Issues (2017)
Volume 5: 4 Issues (2016)
Volume 4: 4 Issues (2015)
Volume 3: 4 Issues (2014)
Volume 2: 4 Issues (2013)
Volume 1: 4 Issues (2012)
View Complete Journal Contents Listing