Development of a Decentralized Personal Indefinable Information (PII) Management Systems Using Blockchain dBFT Consensus Algorithm

  • Chapter
  • First Online:
AI, Blockchain and Self-Sovereign Identity in Higher Education

Abstract

Personal Identifiable Information (PII) management has been a major focus in data management due to the level of threat against it. Personally identifiable information is generally protected by an identity system whose roots can be traced to a centralized application whose data are saved in a database and can be retrieved through authentication using a username and password. Federated Identity management systems evolve because centralised systems get easily compromised and as a result, lots of PII data are exposed. Continuous breaches against these legacy systems have been the major concern of researchers, also the need for users to be in control of their PII data as stated in article 4 of GDPR. The aim of this research is to adopt a qualitative and design science research method to achieve the gap in the existing decentralized identity system which includes consensus algorithms, quantum-safe, compliance to GDPR policies, governance, development language, and scalability among others. This led to the use of Neo 3 blockchain in contrast to the common Ethereum and Hyperledger used by the existing system. This work has shown a new direction to safeguarding users’ data considering the technological factors in decentralized Identity management and has developed a framework that future work can lean on to develop a Decentralised Application for a dBFT PII management system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
EUR 29.95
Price includes VAT (Germany)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
EUR 160.49
Price includes VAT (Germany)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
EUR 213.99
Price includes VAT (Germany)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info
Hardcover Book
EUR 213.99
Price includes VAT (Germany)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Jennings M 2022 Top data breaches and cyber attacks of 2022. In: TechRadar. Retrieved from https://www.techradar.com/features/top-data-breaches-and-cyber-attacks-of-2022

  2. Information Commissioner’s Office (2012) Determining what is personal data. In: Information commissioner’s office (ico.). Retrieved from https://ico.org.uk/media/for-organisations/documents/1554/determining-what-is-personal-data.pdf

  3. Onik MMH et al (2019) Privacy-aware blockchain for personal data sharing and tracking. Open Comput Sci 9(1):80–91. https://doi.org/10.1515/comp-2019-0005

  4. Al-Fedaghi S, Al-Azmi AAR (2012) Experimentation with personal identifiable information. Intell Inf Manag 4:123–133. https://doi.org/10.4236/iim.2012.44019

  5. Yakowtiz J (2011) Tragedy of the data commons. Harvard J Law Technol 25(1):1–67

    Google Scholar 

  6. Mackie J (2022) Personal vs. Sensitive Information. In: TermsFeed. Retrieved from https://www.termsfeed.com/blog/personal-vs-sensitive-information/#The_Gdpr_And_Sensitive_Information

  7. EU-GDPR (2018) EU General Data Protection Regulation (EU-GDPR). In: Official journal of the European Union. Retrieved from https://www.privacy-regulation.eu/en/index.htm

  8. Bing J (1972) Classification of personal information, with respect to sensitivity aspect. In: Proceedings of the first international oslo symposium on data banks and societies, pp 98–150

    Google Scholar 

  9. Rosencrance L, Mathias C (2021) identity management (ID management). In: TechTarget. Retrieved from https://www.techtarget.com/searchsecurity/definition/identity-management-ID-management#:~:text=Identitymanagement(IDmanagement)is,toapplications%2Csystemsornetworks

  10. Hansen M, Pfitzmann A, Steinbrecher S (2008) Identity management throughout one’s whole life. Inf Secur Tech Rep 13(2):83–94. https://doi.org/10.1016/j.istr.2008.06.003

  11. Chen J et al (2011) Differentiated security levels for personal identifiable information in identity management system. Expert Syst Appl 38(11):14156–14162. https://doi.org/10.1016/j.eswa.2011.04.226

  12. Alruwies MH et al (2021) Identity governance framework for privileged users. Comput Syst Sci Eng 40(3):995–1005. https://doi.org/10.32604/csse.2022.019355

  13. De Hert P (2008) Identity management of e-ID, privacy and security in Europe. A human rights view. Inf Secur Tech Rep 13(2):71–75. https://doi.org/10.1016/j.istr.2008.07.001

  14. Camenisch J et al (2005) Privacy and identity management for everyone. In: Proceedings of the 2005 workshop on digital identity management, pp 20–27. https://doi.org/10.1145/1102486.1102491

  15. Liu Y et al (2020) Blockchain-based identity management systems: a review. J Netw Comput Appl 166:102731. https://doi.org/10.1016/j.jnca.2020.102731

  16. Rathee T, Singh P (2021) A systematic literature map** on secure identity management using blockchain technology. J King Saud Univ Comput Inf Sci 34(8, Part B):5782–5796. https://doi.org/10.1016/j.jksuci.2021.03.005

  17. Chang F et al (2021) A maintenance decision-making oriented collaborative cross-organization knowledge sharing blockchain network for complex multi-component systems. J Cleaner Prod 282:124541. https://doi.org/10.1016/j.jclepro.2020.124541

  18. Brown RG et al (2016) Corda: an introduction, pp 1–15. https://doi.org/10.13140/RG.2.2.30487.37284

  19. El Haddouti S, Ech-Cherif El Kettani MD (2019) Analysis of identity management systems using blockchain technology. In: 2019 International conference on advanced communication technologies and networking (CommNet). IEEE, pp 1–7. https://doi.org/10.1109/COMMNET.2019.8742375

  20. Gutierrez C (2017) The journey to a self-sovereign digital identity built on a blockchain. Retrieved from https://www.altoros.com/blog/the-journey-to-a-self-sovereign-digital-identity-built-on-a-blockchain/

  21. Lim SY et al (2018) Blockchain technology the identity management and authentication service disruptor: a survey. Int J Adv Sci Eng Inf Technol 8(4–2):1735–1745. https://doi.org/10.18517/ijaseit.8.4-2.6838

  22. Yang X, Li W (2020) A zero-knowledge-proof-based digital identity management scheme in blockchain. Comput Secur 99:102050. https://doi.org/10.1016/j.cose.2020.102050

    Article  Google Scholar 

  23. Bouras MA et al (2021) A lightweight blockchain-based IoT identity management approach. Future Internet 13(2):1–14. https://doi.org/10.3390/fi13020024

  24. Wang S, Pei R, Zhang Y (2019) EIDM: A ethereum-based cloud user identity management protocol. IEEE Access 7:115281–115291. https://doi.org/10.1109/ACCESS.2019.2933989

    Article  Google Scholar 

  25. Cai Y, Zhu D (2016) Fraud detections for online businesses: a perspective from blockchain technology. Financ Innov 2(1):1–10. https://doi.org/10.1186/s40854-016-0039-4

  26. Liang Y (2019) Identity verification and management of electronic health records with blockchain technology. In: 2019 IEEE International conference on healthcare informatics (ICHI). IEEE, pp 1–3. https://doi.org/10.1109/ICHI.2019.8904712

  27. Priya N, Ponnavaikko M, Aantonny R (2020) An efficient system framework for managing identity in educational system based on blockchain technology. In: 2020 International conference on emerging trends in information technology and engineering (ic-ETITE). IEEE, pp 1–5. https://doi.org/10.1109/ic-ETITE47903.2020.469

  28. Rouhani S, Deters R (2021) Data trust framework using blockchain technology and adaptive transaction validation. IEEE Access 9:90379–90391. https://doi.org/10.1109/ACCESS.2021.3091327

  29. Belurgikar DA et al (2019) Identity solutions for verification using blockchain technology. In: 2019 1st International conference on advanced technologies in intelligent control, environment, computing and communication engineering (ICATIECE). IEEE, pp 121–126. https://doi.org/10.1109/ICATIECE45860.2019.9063802

  30. Chakraborty S, Aich S, Kim H-C (2019) A secure healthcare system design framework using blockchain technology. In: 2019 International conference on advanced communication technology (ICACT). IEEE, pp 260–264. https://doi.org/10.23919/ICACT.2019.8701983

  31. Rahmadika S, Rhee K-H (2018) Blockchain technology for providing an architecture model of decentralized personal health information. Int J Eng Bus Manag 10:1–12. https://doi.org/10.1177/1847979018790589

  32. Ul Hassan M, Rehmani MH, Chen J (2020) Differential privacy in blockchain: a futuristic approach. J Parallel Distrib Comput, Elsevier 145:50–74

    Google Scholar 

  33. Zhang J, Tan R, Yu-dong L (2020) Design of personal credit information sharing platform based on consortium blockchain. Commun Comput Inf Sci 1286:166–177. https://doi.org/10.1007/978-981-15-9739-8_14

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hamid Jahankhani .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Kareem, Y., Jahankhani, H. (2023). Development of a Decentralized Personal Indefinable Information (PII) Management Systems Using Blockchain dBFT Consensus Algorithm. In: Jahankhani, H., Jamal, A., Brown, G., Sainidis, E., Fong, R., Butt, U.J. (eds) AI, Blockchain and Self-Sovereign Identity in Higher Education. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-031-33627-0_8

Download citation

Publish with us

Policies and ethics

Navigation