Identity Management Systems: A Comparative Analysis

Identity Management Systems: A Comparative Analysis

Vikas Kumar, Aashish Bhardwaj
Copyright: © 2018 |Pages: 16
DOI: 10.4018/IJSDS.2018010105
(Individual Articles)
No Current Special Offers


This article describes how in today's digital world, customers have made it a common practice to maintain user accounts with different service providers to access a range of services. In such environment, all attributes of the identity must be verified to operate, otherwise the resources would be vulnerable to financial and data loss. This article contends that makes it important to form an Identity Management System, which could provide central administration, user self- service, role based access control and integrated user management. Identity Management becomes very much vital for the environment working with multiple technologies, as it governs an entity (i.e. a human or a software agent) to authenticate and authorize for accessing the network via multiple technologies. Successful Identity Management increases the efficiency, security, access control and decreases the complexity, cost and many repetitive works. Essential features of present day identity management systems have been identified in the present work. A comparative analysis of these identity management systems has been carried out to establish the present-day industry practices. Along with that, specific challenges to the present-day identity management systems have been identified. The article helps in the identification of suitable Identity Management System for specific applications.
Article Preview

1. Introduction

As the world population is increasing, number of Internet users, mobile phone users and email users is also increasing. World population clock, worldometer (2017) has calculated world population as 7.51 billion, whereas it was merely 3.68 billion in 1970. There has been an appreciable increase in the number of email users as well. As per the Email Statistics Report (Team, 2015), email users throughout the world are increasing at a rate of 3% since 2015 but Email accounts are increasing at 6% - 7% every year since 2015 (Team, 2015). This has been a trend to have multiple email accounts by individuals for personal reasons. A valid email account is primary requirement for all online transactions like shopping, banking, social networking etc., which drives the way for having multiple email accounts. Email accounts are not only used for interpersonal communication but also for many other online notifications and transactions as well. On the other hand, mobile phones have become an integral part of the society and they are serving as the primary technology interface, rather than being a mere communication device. There has been an unprecedented increase in the number of mobile phone users worldwide. Mobile phone users will reach 5.07 billion in 2019 from 4.77 billion in 2017 (Statista, 2017). This has steadily increased from 4.01 billion in 2013 to 4.61 billion in 2016. As per Internet World Stats (2017), penetration rate of Internet will reach 49.7% world-wide. This further leads to the increase in number of internet based applications.

Social media has emerged as another popular tool and large amount of personal information flows on internet via social media. This includes person’s profile photo, name, contact number, address and other personal details. All these are enough for a criminal to steal the identity of a person. Even though authorities are also vigilant for these thefts and are using different means to prevent these incidents to happen. Around the world, police is actively conducting surveillance and investigations for years to prevent incidents of identity theft. Even after that, the identity theft incidents are not stopping and many public politicians and figures fear such an impersonation attack. Many specific cases of social media and identity theft have been presented by Socialnomics (2016). The 2017 Identity Fraud Study (Javelin Strategy & Research, 2017) revealed that the identity fraud incidence rate has increased by 16% from 2015 to 2016 in United States. The study also found that fraudsters have successfully targeted two million more victims this year and the theft has amounted to $16 billion. This study has also found that fraudsters are moving to the online platforms and Card-not-present (CNP) fraud is significantly increasing. As the microchip equipped credit cards got introduced in United States in 2015, these cards are difficult to counterfeit. Hence, the criminals focused on new account fraud, where a fraudster opens a credit card or other financial account using a victim’s name and other stolen personal information. These show a very typical case of identity theft. Also, in 2016, thirteen percent of all complaints received by the Federal Trade Commission (USA) were related to identity theft (

Complete Article List

Search this Journal:
Volume 14: 1 Issue (2023)
Volume 13: 4 Issues (2022): 1 Released, 3 Forthcoming
Volume 12: 3 Issues (2021)
Volume 11: 4 Issues (2020)
Volume 10: 4 Issues (2019)
Volume 9: 4 Issues (2018)
Volume 8: 4 Issues (2017)
Volume 7: 4 Issues (2016)
Volume 6: 4 Issues (2015)
Volume 5: 4 Issues (2014)
Volume 4: 4 Issues (2013)
Volume 3: 4 Issues (2012)
Volume 2: 4 Issues (2011)
Volume 1: 4 Issues (2010)
View Complete Journal Contents Listing