Reimagining Digital Identity Management: A Critical Review of Blockchain-Based Identity and Access Management (IAM) Systems - Architectures, Security Mechanisms, and Industry-Specific Applications

Authors

  • Ashok Kumar Reddy Sadhu Software Engineeur, Deloitte, Dallas, Texas, USA Author

Keywords:

Blockchain Technology, Decentralized Identity

Abstract

The growth of internet services and applications has made digital identities essential to secure interactions in contemporary society. How well Identity and Access Management (IAM) systems secure these interactions is crucial. Data breaches and privacy problems are threatening traditional, centralized IAM systems, which have supported digital identity management for decades. This paper investigates blockchain-enabled IAM solutions and their potential to change digital identity management. We analyze blockchain-based IAM's distributed ledger, consensus, and information integrity cryptographic primitives to understand its architecture.

References

1. Blockchain-Based Identity Management System and Self-Sovereign Identity Ecosystem: A Comprehensive Survey

[1] Z. Yan et al., "Blockchain-Based Identity Management System and Self-Sovereign Identity Ecosystem: A Comprehensive Survey," in IEEE Access, vol. 10, no. 99, pp. 113436-113481, 2021, doi: 10.1109/ACCESS.2021.3222223

2. Blockchain-Based Identity Management: A Survey From the Enterprise and Ecosystem Perspective

[2] T. V. Daugaard et al., "Blockchain-Based Identity Management: A Survey From the Enterprise and Ecosystem Perspective," in IEEE Communications Surveys & Tutorials, vol. 26, no. 2, pp. 910-940, 2021

3. A First Look at Identity Management Schemes on the Blockchain

[3] P. Dunphy and F. A. P. Petitcolas, "A First Look at Identity Management Schemes on the Blockchain," in IEEE Security & Privacy Magazine, vol. 16, no. 1, pp. 88-96, Jan.-Feb. 2018, doi: 10.1109/MSEC.2017.4247020

4. Self-Sovereign Identity (SSI): A Decentralized Paradigm for Identity Management [4] D. Nikaj et al., "Self-Sovereign Identity (SSI): A Decentralized Paradigm for Identity Management," in 2017 IEEE Conference on Identity, Security and Cloud (ISC), pp. 1-9, 2017, doi: 10.1109/ISC.2017.82

5. Hyperledger Fabric: A Distributed Ledger Framework for Permissioned Blockchains

[5] E. Androulaki et al., "Hyperledger Fabric: A Distributed Ledger Framework for Permissioned Blockchains," in Proceedings of the Fourteenth ACM European Conference on Computer Systems (ECCS '17), pp. 307-318, 2017, doi: 10.1145/3098633.3098681

6. The Blockchains, Cryptocurrencies, and Decentralized Applications [6] A. Narayanan et al., "The Blockchains, Cryptocurrencies, and Decentralized Applications," ACM Computing Surveys (CSUR), vol. 51, no. 6, pp. 1-67, Dec. 2018, doi: 10.1145/3275188

7. Proof of Stake (POS): A Practical Primary Consensus Mechanism for Smart Contracts [7] V. Buterin, "Proof of Stake (POS): A Practical Primary Consensus Mechanism for Smart Contracts," arXiv [cs.CR], Feb. 2017, arXiv:1602.00789

8. Byzantine Fault Tolerance (BFT) and Its Applications [8] M. Castro and B. Liskov, "Byzantine Fault Tolerance (BFT) and Its Applications," in Proceedings of the seventeenth ACM symposium on Operating systems principles (SOSP '99), pp. 398-405, 1999, doi: 10.1145/319596.319612

9. Decentralized Identifiers (DIDs) for Blockchain Identity Management [9] D. Reed et al., "Decentralized Identifiers (DIDs) for Blockchain Identity Management," Internet Engineering Task Force (IETF), Request for Comments (RFC) 9187, Nov. 2021, https://www.ietf.org/

10. Smart Contracts: Putting Agreements on the Blockchain [10] N. Szabo, "Smart Contracts: Putting Agreements on the Blockchain," 1994, https://bitcoinmagazine.com/technical/smart-contracts-described-by-nick-szabo-years-ago-now-becoming-reality-1461693751

11. Secure Multi-Party Computation from Any Two-Party Secure Computation [11] Y. Lindell and B. Pinkas, "Secure Multi-Party Computation from Any Two-Party Secure Computation," in Proceedings of the thirty-fourth annual ACM symposium on Theory of computing (STOC '02), pp. 160-169, 200

Downloads

Published

06-10-2021

How to Cite

[1]
Ashok Kumar Reddy Sadhu, “Reimagining Digital Identity Management: A Critical Review of Blockchain-Based Identity and Access Management (IAM) Systems - Architectures, Security Mechanisms, and Industry-Specific Applications”, Adv. in Deep Learning Techniques, vol. 1, no. 2, pp. 1–23, Oct. 2021, Accessed: Apr. 29, 2025. [Online]. Available: https://tsbpublisher.org/adlt/article/view/92