Reference Hub1
Applications of Data Security and Blockchain in Smart City Identity Management

Applications of Data Security and Blockchain in Smart City Identity Management

Amit Verma, Anushi Singh, Puneet Sethi, Vipin Jain, Chanchal Chawla, Akshay Bhargava, Ankur Gupta
ISBN13: 9781668464083|ISBN10: 166846408X|ISBN13 Softcover: 9781668464090|EISBN13: 9781668464106
DOI: 10.4018/978-1-6684-6408-3.ch009
Cite Chapter Cite Chapter

MLA

Verma, Amit, et al. "Applications of Data Security and Blockchain in Smart City Identity Management." Handbook of Research on Data-Driven Mathematical Modeling in Smart Cities, edited by Sabyasachi Pramanik and K. Martin Sagayam, IGI Global, 2023, pp. 154-174. https://doi.org/10.4018/978-1-6684-6408-3.ch009

APA

Verma, A., Singh, A., Sethi, P., Jain, V., Chawla, C., Bhargava, A., & Gupta, A. (2023). Applications of Data Security and Blockchain in Smart City Identity Management. In S. Pramanik & K. Sagayam (Eds.), Handbook of Research on Data-Driven Mathematical Modeling in Smart Cities (pp. 154-174). IGI Global. https://doi.org/10.4018/978-1-6684-6408-3.ch009

Chicago

Verma, Amit, et al. "Applications of Data Security and Blockchain in Smart City Identity Management." In Handbook of Research on Data-Driven Mathematical Modeling in Smart Cities, edited by Sabyasachi Pramanik and K. Martin Sagayam, 154-174. Hershey, PA: IGI Global, 2023. https://doi.org/10.4018/978-1-6684-6408-3.ch009

Export Reference

Mendeley
Favorite

Abstract

Applications of blockchain might be related to healthcare and commercial sector. Need of such application is growing in smart cities. It has been observed that its implication are quite complex. The goal of the blockchain technology is to make it possible to store and distribute digital data without the risk of it being altered in transit. A blockchain provides the basis for immutable ledgers or transaction records that cannot be edited, erased, or destroyed. The term “blockchain” is often used to refer to DLT. Hashing is a sophisticated procedure that cannot be modified or reversed. When it comes to data security, it's all about safeguarding your information against unwanted access and corruption at every stage of its lifespan. Encryption, hashing, tokenization, and key management methods are all part of the data security process. The term “identity and access management” refers to all of the methods and technologies used inside a business to identify, authenticate, and authorize users to access services and systems within that business or other associated businesses.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.