A Secure Authentication System borrowing the concept of Block-Chain with the utilization of centralized and decentralized nodes

No Thumbnail Available
Date
2020
Authors
Wasim, Anabtawi
Ahmad, Maqboul
Journal Title
Journal ISSN
Volume Title
Publisher
Abstract
The process of identifying people is considered to be an important task, especially in this century where people face problems like identity theft and identity fraud. In addition to some citizens being favored by the central government. Which justifies the need for an unbiased citizen authentication system. This paper proposes a system that will help people and various organizations to identify people in order to maintain a trust worthy relationship between them while doing transactions. The proposed system will have no central authority that will take control of the process, the system will lean on three main parts, which are the central government, the user asking to be identified and the peers who will know the user. The proposed system borrows the concept of block-chain technologies and utilizes it with the architecture of centralized systems. The proposed system uses different types of authentication, encryption, and hash algorithms to ensure its integrity and functionality. It will provide organizations that require time and effort to prove the identity of a certain citizen in order to complete a transaction or get a legal document. One of these examples is the process of transferring land from one citizen to another through the ministry of land, housing and urban development, because the system used usually consumes time and effort, the proposed system will provide digital certificates which will be merged into one QR code. And that one QR code will be a proof of identity for the user that has it, the user will be able to use it in any organization or party to prove their identity, while removing any possibility of identity theft or fraud from the user side. The system security analysis in this paper shows the effectiveness of the proposed system against various types of attacks and scenarios. And finally, the evaluation process in this paper shows the different evaluation methods used while creating the system, with different scenarios and evaluating values in order to understand the relationships between metrics in the system clearly.
Description
Keywords
Citation