Blockchain and the Identity based Encryption Scheme for High Data Security
Title | Blockchain and the Identity based Encryption Scheme for High Data Security |
Publication Type | Conference Paper |
Year of Publication | 2020 |
Authors | Khan, S., Jadhav, A., Bharadwaj, I., Rooj, M., Shiravale, S. |
Conference Name | 2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC) |
Date Published | March 2020 |
Publisher | IEEE |
ISBN Number | 978-1-7281-4889-2 |
Keywords | authentication, authorisation, Authorization, blockchain, blockchain technology, consensus, Consensus algorithm, cryptography, data integrity, data privacy, data protection, data storage, Distributed databases, document handling, file organisation, fraud, hash algorithms, high data security, Human Behavior, identity based encryption, identity based encryption management, Identity management, message authentication, private document storage, pubcrawl, resilience, Resiliency, Scalability, storage management |
Abstract | Using the blockchain technology to store the privatedocuments of individuals will help make data more reliable and secure, preventing the loss of data and unauthorized access. The Consensus algorithm along with the hash algorithms maintains the integrity of data simultaneously providing authentication and authorization. The paper incorporates the block chain and the Identity Based Encryption management concept. The Identity based Management system allows the encryption of the user's data as well as their identity and thus preventing them from Identity theft and fraud. These two technologies combined will result in a more secure way of storing the data and protecting the privacy of the user. |
URL | https://ieeexplore.ieee.org/document/9076552 |
DOI | 10.1109/ICCMC48092.2020.ICCMC-000187 |
Citation Key | khan_blockchain_2020 |
- file organisation
- storage management
- Scalability
- Resiliency
- resilience
- pubcrawl
- private document storage
- message authentication
- Identity management
- identity based encryption management
- identity based encryption
- Human behavior
- high data security
- hash algorithms
- fraud
- authentication
- document handling
- Distributed databases
- data storage
- Data protection
- data privacy
- data integrity
- Cryptography
- Consensus algorithm
- Consensus
- blockchain technology
- blockchain
- authorization
- authorisation