Abstract
Personal Identifiable Information (PII) management has been a major focus in data management due to the level of threat against it. Personally identifiable information is generally protected by an identity system whose roots can be traced to a centralized application whose data are saved in a database and can be retrieved through authentication using a username and password. Federated Identity management systems evolve because centralised systems get easily compromised and as a result, lots of PII data are exposed. Continuous breaches against these legacy systems have been the major concern of researchers, also the need for users to be in control of their PII data as stated in article 4 of GDPR. The aim of this research is to adopt a qualitative and design science research method to achieve the gap in the existing decentralized identity system which includes consensus algorithms, quantum-safe, compliance to GDPR policies, governance, development language, and scalability among others. This led to the use of Neo 3 blockchain in contrast to the common Ethereum and Hyperledger used by the existing system. This work has shown a new direction to safeguarding users’ data considering the technological factors in decentralized Identity management and has developed a framework that future work can lean on to develop a Decentralised Application for a dBFT PII management system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Jennings M 2022 Top data breaches and cyber attacks of 2022. In: TechRadar. Retrieved from https://www.techradar.com/features/top-data-breaches-and-cyber-attacks-of-2022
Information Commissioner’s Office (2012) Determining what is personal data. In: Information commissioner’s office (ico.). Retrieved from https://ico.org.uk/media/for-organisations/documents/1554/determining-what-is-personal-data.pdf
Onik MMH et al (2019) Privacy-aware blockchain for personal data sharing and tracking. Open Comput Sci 9(1):80–91. https://doi.org/10.1515/comp-2019-0005
Al-Fedaghi S, Al-Azmi AAR (2012) Experimentation with personal identifiable information. Intell Inf Manag 4:123–133. https://doi.org/10.4236/iim.2012.44019
Yakowtiz J (2011) Tragedy of the data commons. Harvard J Law Technol 25(1):1–67
Mackie J (2022) Personal vs. Sensitive Information. In: TermsFeed. Retrieved from https://www.termsfeed.com/blog/personal-vs-sensitive-information/#The_Gdpr_And_Sensitive_Information
EU-GDPR (2018) EU General Data Protection Regulation (EU-GDPR). In: Official journal of the European Union. Retrieved from https://www.privacy-regulation.eu/en/index.htm
Bing J (1972) Classification of personal information, with respect to sensitivity aspect. In: Proceedings of the first international oslo symposium on data banks and societies, pp 98–150
Rosencrance L, Mathias C (2021) identity management (ID management). In: TechTarget. Retrieved from https://www.techtarget.com/searchsecurity/definition/identity-management-ID-management#:~:text=Identitymanagement(IDmanagement)is,toapplications%2Csystemsornetworks
Hansen M, Pfitzmann A, Steinbrecher S (2008) Identity management throughout one’s whole life. Inf Secur Tech Rep 13(2):83–94. https://doi.org/10.1016/j.istr.2008.06.003
Chen J et al (2011) Differentiated security levels for personal identifiable information in identity management system. Expert Syst Appl 38(11):14156–14162. https://doi.org/10.1016/j.eswa.2011.04.226
Alruwies MH et al (2021) Identity governance framework for privileged users. Comput Syst Sci Eng 40(3):995–1005. https://doi.org/10.32604/csse.2022.019355
De Hert P (2008) Identity management of e-ID, privacy and security in Europe. A human rights view. Inf Secur Tech Rep 13(2):71–75. https://doi.org/10.1016/j.istr.2008.07.001
Camenisch J et al (2005) Privacy and identity management for everyone. In: Proceedings of the 2005 workshop on digital identity management, pp 20–27. https://doi.org/10.1145/1102486.1102491
Liu Y et al (2020) Blockchain-based identity management systems: a review. J Netw Comput Appl 166:102731. https://doi.org/10.1016/j.jnca.2020.102731
Rathee T, Singh P (2021) A systematic literature map** on secure identity management using blockchain technology. J King Saud Univ Comput Inf Sci 34(8, Part B):5782–5796. https://doi.org/10.1016/j.jksuci.2021.03.005
Chang F et al (2021) A maintenance decision-making oriented collaborative cross-organization knowledge sharing blockchain network for complex multi-component systems. J Cleaner Prod 282:124541. https://doi.org/10.1016/j.jclepro.2020.124541
Brown RG et al (2016) Corda: an introduction, pp 1–15. https://doi.org/10.13140/RG.2.2.30487.37284
El Haddouti S, Ech-Cherif El Kettani MD (2019) Analysis of identity management systems using blockchain technology. In: 2019 International conference on advanced communication technologies and networking (CommNet). IEEE, pp 1–7. https://doi.org/10.1109/COMMNET.2019.8742375
Gutierrez C (2017) The journey to a self-sovereign digital identity built on a blockchain. Retrieved from https://www.altoros.com/blog/the-journey-to-a-self-sovereign-digital-identity-built-on-a-blockchain/
Lim SY et al (2018) Blockchain technology the identity management and authentication service disruptor: a survey. Int J Adv Sci Eng Inf Technol 8(4–2):1735–1745. https://doi.org/10.18517/ijaseit.8.4-2.6838
Yang X, Li W (2020) A zero-knowledge-proof-based digital identity management scheme in blockchain. Comput Secur 99:102050. https://doi.org/10.1016/j.cose.2020.102050
Bouras MA et al (2021) A lightweight blockchain-based IoT identity management approach. Future Internet 13(2):1–14. https://doi.org/10.3390/fi13020024
Wang S, Pei R, Zhang Y (2019) EIDM: A ethereum-based cloud user identity management protocol. IEEE Access 7:115281–115291. https://doi.org/10.1109/ACCESS.2019.2933989
Cai Y, Zhu D (2016) Fraud detections for online businesses: a perspective from blockchain technology. Financ Innov 2(1):1–10. https://doi.org/10.1186/s40854-016-0039-4
Liang Y (2019) Identity verification and management of electronic health records with blockchain technology. In: 2019 IEEE International conference on healthcare informatics (ICHI). IEEE, pp 1–3. https://doi.org/10.1109/ICHI.2019.8904712
Priya N, Ponnavaikko M, Aantonny R (2020) An efficient system framework for managing identity in educational system based on blockchain technology. In: 2020 International conference on emerging trends in information technology and engineering (ic-ETITE). IEEE, pp 1–5. https://doi.org/10.1109/ic-ETITE47903.2020.469
Rouhani S, Deters R (2021) Data trust framework using blockchain technology and adaptive transaction validation. IEEE Access 9:90379–90391. https://doi.org/10.1109/ACCESS.2021.3091327
Belurgikar DA et al (2019) Identity solutions for verification using blockchain technology. In: 2019 1st International conference on advanced technologies in intelligent control, environment, computing and communication engineering (ICATIECE). IEEE, pp 121–126. https://doi.org/10.1109/ICATIECE45860.2019.9063802
Chakraborty S, Aich S, Kim H-C (2019) A secure healthcare system design framework using blockchain technology. In: 2019 International conference on advanced communication technology (ICACT). IEEE, pp 260–264. https://doi.org/10.23919/ICACT.2019.8701983
Rahmadika S, Rhee K-H (2018) Blockchain technology for providing an architecture model of decentralized personal health information. Int J Eng Bus Manag 10:1–12. https://doi.org/10.1177/1847979018790589
Ul Hassan M, Rehmani MH, Chen J (2020) Differential privacy in blockchain: a futuristic approach. J Parallel Distrib Comput, Elsevier 145:50–74
Zhang J, Tan R, Yu-dong L (2020) Design of personal credit information sharing platform based on consortium blockchain. Commun Comput Inf Sci 1286:166–177. https://doi.org/10.1007/978-981-15-9739-8_14
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Kareem, Y., Jahankhani, H. (2023). Development of a Decentralized Personal Indefinable Information (PII) Management Systems Using Blockchain dBFT Consensus Algorithm. In: Jahankhani, H., Jamal, A., Brown, G., Sainidis, E., Fong, R., Butt, U.J. (eds) AI, Blockchain and Self-Sovereign Identity in Higher Education. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-031-33627-0_8
Download citation
DOI: https://doi.org/10.1007/978-3-031-33627-0_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-33626-3
Online ISBN: 978-3-031-33627-0
eBook Packages: Physics and AstronomyPhysics and Astronomy (R0)