Download as pdf or txt
Download as pdf or txt
You are on page 1of 9

Blockchain-Based Personal Identity Security

System
Jahangirabad Institute of Technology, Shaista Tanveer, Aniket Sharma, Rupali Sharma, Finaz Khan
Barabanki Uttar Pradesh India

Project Guide - Mohammad Sadique Ansari


(Assistant Professor CSE Department)

dept. Computer Science Engineering

ABSTRACT—
Identity theft is the unauthorized information without raising suspicions
acquisition of another person’s about a final attack, identity theft, or
confidential information in order to fraud. Our blockchain based Personal
misuse it. Organizations and individuals Identity Security System assists in
should exercise caution when it comes to securely storing personal identity data
protecting their identities in order to without fear of it being compromised or
avoid fraud as a result of identity theft. lost. In this system, the admin can access
This information is freely available to all the users and verify those accounts.
attackers in user profiles. Attackers use
this information to obtain additional
and verified attributes, enables the users
“In this paper, we have tried to provide of data to exert their ownership and
more security in the Blockchain-Based gain insights from digital identity is
Personal Identity Security System essential to achieve the privacy and
project. After reading many research security of distributed digital identities.
papers related to the Blockchain-based It describes a novel approach to
project, we believe that we have updated building a decentralized transparent
and provided security in this project. In immutable secure personal archive
all the remaining research papers, management and service system. A
identity has been managed by storing decentralized system has been created
data in a transparent platform in along with which smart contracts and
blockchain technology. The self- cryptography techniques have been
sovereign concept, which includes the used to provide further security.”
individual's consolidated digital identity

Keywords:— Personal Identity,


Encryption, Digital Identity, Smart
Contract.

1. INTRODUCTION –
In recent decades, it has been brought to misused or leaked and financial assets are
people’s attention that the Internet security hacked etc. These security events directly
issue is crucial and challenging. Many or indirectly cause the economic losses for
sensitive personal information is often the Internet users, even destroy the whole
Internet transaction environment. Thus, stealing/misusing/manipulating these data
how to manage an identity over the in this centralized server. In 2008, Satoshi
Internet becomes an important problem for Nakamoto proposed the concept of Bitcoin
both the Internet companies and academic , where users trade freely on the Internet
researchers. Many efforts have been taken without a credible/trusted third
to seek effective approaches in protecting party.Because the popularity and fast
the personal data security. However, the development of Bitcoin, Blockchain that
personal data is traditionally stored in a the technology supports Bitcoin begins to
centralized server, which makes it possible take the public attention. In other words,
for hackers or attackers to achieve their the Bitcoin starts a new era for the
malicious goals by Blockchain technology [13], where it is
possible to create and transfer values decentralization where the whole database
without trusted medium on the Internet [8]. is maintained by all the nodes on the
The biggest feature of the Blockchain is its network.
protecting identify management system. From the technical perspective, we store
Meanwhile, the users are able to store their personal identities and reputation
personal information in the Blockchain information in the blocks, a distributed
without worrying about anyone to illegally database system. Thus, there is no central
steal or modify their data, ensuring the management organization in the system,
information security requirement of an which ensures the system data be safe and
identity management. In this paper, we credible. From the management
propose an identity management system perspective, the reputation of users are
based on the Blockchain technology. In constructed based on the process of
our model, we combine the identity building the blocks, which is the first
authentication technology and reputation attempt in the literature and points a new
management together, then establish a direction for reputation management
personal online reputation data file on the. systems based on the Blockchain.

RELATED WORK
Blockchain Blockchain is a distributed of independent users . Once a transaction
database system, which can also be treated is written in a block, the transaction data
as a public ledge that is maintained by lots has to be agreed by all the nodes in the
system and the data cannot be further abstraction of all the data stored in the
modified by any node. If the data in a whole block based chain. In other words,
block on the chain is illegally changed, it each node holds a copy of the database,
will affect the entire chain after this block which guarantees that the database cannot
and other nodes will not acknowledge the be manipulated by a single node
validity of the data on the chain Moreover, individually. The architecture of the blocks
all the system rules are public and in the form of a chain, linked by
transparent, and are also agreed by all the cryptography hash, provides the promising
nodes. Each node holds the information distributed security.

Ethereum and Smart Contract:


Ethereum is an open source Blockchain contract is automatically executed .
project . It proposes a common Blockchain Therefore the projects based on the
solution that allows anyone to create a Ethereum and smart contracts are
distributed application based on decentralized and credible in the
Blockchain. The biggest feature of the Blockchain. The data fingerprint on the
Ethereum that it links the smart contract Blockchain is protected by a private key.
and the Blockchain. A smart contract is a Only the users who hold the private key
numerally defined contract which is can modify the data. OneName provides
similar to a traditional paper contract. A an identity service that allows users to bind
smart contract specifies the participants, their names and bitcoin addresses to social
the execution conditions, other detailed accounts, which is equivalent to provide a
transaction rules. The difference with the public Bitcoin address and digital
traditional contract is that the smart signature for each social account. The
contract is completely controlled by the Bitnation project allows users to register as
computer program and does not depend on a Bitnation“Citizens” and get Bitnation’s
any agency. Once the contract is deployed “World Citizen Identity Card”. With the
on the chain, no individual node is able to assigned citizenship, a user is able to
change it. Meanwhile, once the execution access the self-accredited services in the
conditions of the contract are satisfied, the Bitnation.

2. LITERATURE REVIEW
Blockchain
Blockchain technology in simple words is have any need for centralized authorities
a digital database where information or to verify our transactions, blockchain
data is stored in blocks that are linked makes it decentralized and secure. The
together to form a chain. This Blockchain security is maintained by cryptographic
Tutorial covers all basic to advanced processes performed by p2p users,
topics of blockchain like cryptography, through the process called Data
Blockchain Algorithms, Blockchain mining Here are some important features
Architecture, Blockchain Security, Smart given below:
Contracts, etc  Secure
 Transparent
Blockchain is a distributed digital ledger
 Tamper-proof
of transactions. It changes the whole
 Peer-to-peer transaction
concept of the transaction now we don’t

Smart Contract
The third-generation revolution of smart contract by defining arbitrary rules.
blockchain broaden the application of The functions in Ethereum smart steps and
blockchain in various domain besides asset storage space. The gas cost is paid in
management and cryptocurrency. The cryptocurrency called ether.
complex applications can be controlled by

Background
In this project we have used Sha-256 the username. Both of these algorithms are
algorithm for username, which will secure concepts of cryptoAlong with this, private
the username and prevent it from being key has also been used which is used to
hacked. Along with Sha-256, we have also secure the file with the help of the key
used salt, which works to further secure which will be of 6 digits

Flow chart

3. RESEARCH METHODOLOGY
Before this system could be developed, a reading many research papers, we read
literature survey was done to get a clear many concepts and we found that some
framework through making a review. The more concepts were lacking in this system
keywords used to search for papers from and by using these concepts, we can create
2014 to 2022 were as follows: blockchain a more secure system. In the rest of the
identity, blockchain storage, smart research papers, the concept of blockchain
contracts, and security issues. After was mentioned.
The blockchain is a decentralized storage “In this project we have used Sh-256
system that stores data in a sequence of algorithm for username, which will
blocks connected by cryptographic hashing secure the username and prevent it
of previous blocks. In this project, the from being hacked. Along with Sh-256,
front-end involves Html, CSS, and we have also used salt, which works to
JavaScript and the back-end involves PHP further secure the username. Both of
MYADMIN The IDE used is Visual these algorithms are concepts of
Studio and the database is MSSQL. Our cryptoAlong with this, private key has
blockchain-based Personal Identity also been used which is used to secure
Security System assists in securely storing the file with the help of the key which
personal identity data without fear of it will be of 6 digits”.
being compromised or lost.
Fig.1Username(Sha-256 and Salt)
Sha-256 –
SHA-256 can help secure SSL/TLS check our hashing vs
(Transport Layer Security) certificates by encryption comparison.
creating a digital signature your device can SHA-256 is the successor of SHA-1, a
verify. For example, when a server widely popular algorithm in the past.
presents its TLS certificate to clients such However, it has
as web browsers, the client can then use since been deemed insecure due to
the corresponding public key to decrypt vulnerabilities discovered in its code. As
and verify the signature. technology advanced and computing
SHA stands for Secure Hashing power increased, it became easier for
Algorithm, and it is a family attackers to exploit these weaknesses and
of cryptographic hash functions developed compromise the integrity of hashed data.
by the National Security Agency (NSA) in SHA-256 refers to the bit size of the hash
the United States. A hash function, in output. In other words, the resulting hash
simple terms, is a mathematical algorithm value from SHA-256 is 256 bits long,
that takes an input (any data, like a which provides a significantly larger
file or a password) and produces a fixed- search space compared to its predecessor,
size string of characters, which is the hash making it computationally infeasible to
value or digest. But keep in mind that it is reverse engineer the original input from
not encryption. To know how they differ, the hash value.
Fig2.File Key Generator(Private Key)

Private key-
A private key, also known as a secret also used to verify the sender
key, is a mathematical key (kept secret authentication. In simple words, one can
by the holder) used to create digital say that a public key is used for closing the
signatures and, depending on the lock.
algorithm, to decrypt messages or files Private Key: The private key is totally
encrypted (for confidentiality) with the opposite of the public key. The private key
corresponding public key. is always kept secret and never shared.
Public Key: Public keys are designed to Using this key we decrypt cipher text
be public. They can be freely given to messages into plain text. In simple words,
everyone or posted on the internet. By one can say that the private key is used for
using the public key, one can encrypt the opening the lock.
plain text message into the cipher text. It is

4. PROBLEM STATEMENT
Many different vulnerabilities hinder gaining entry to personal records
traditional identity management without permission. Even though they
systems such as storing private show promise, current blockchain-based
information in one place, easy targets solutions for identity often encounter
for hackers to break into and people not scalability issues as well as the inability
having control over their data. This puts to work with other systems’ data or
people at risk for things like having provide many useful functions. What is
their identities stolen or someone else required now is an urgently needed
robust decentralized user-centric more authority over their identification
identity management system that would and ensuring the integrity and
use the security capabilities of confidentiality of their
blockchain technology to solve these information/records.
weaknesses while giving individuals

5. IMPLEMENTATION
In our project based on privacy protection SHA-256 to securely hash sensitive
using blockchain, step one is growing a statistics of the consumer earlier than
frontend interface and registration. We storing it in blockchain or off-chain
prioritize growing a smooth and easy enjoy databases. Using hashing and other
for users to interact with our identification encryption techniques, we prevent
control platform. unauthorized access to records and strong
personal facts.
The interface is designed simply so users
can easily input private statistics like their Throughout the implementation phase, we
name, personal data and other perform practices in protection necessities
records/information.In order to ensure to create a scalable and dependable tool.
integrity and security of person By combining front-end layout with
information, we use SHA-256 encryption encryption techniques together with SHA-
set of rules. SHA-256 is a widely used 256 hashing, our intention is to supply a
cryptographic hash feature recognized for best solution for person identity protection
its robustness to crash attacks. We use on the blockchain.

6. RESULT
The proposed system aims to provide more the second is the efficiency of the
secure and faster execution of identity encryption algorithm. There will be some
management in the blockchain. Therefore, problems due to multiple verification but
two metrics were used in this study to we will make more efforts to make this
evaluate the performance. The first metric system user-friendly.
is the user identity verification time, while

7. ANALYSIS
Here, we analyse that our blockchain- analysis confirms that the SHA-256
based personal identification safety model concept gives strong safety. This feature
is very effective that uses some key ensured that person identification records
concepts such as the SHA-256 algorithm, remained personal and safeguarding from
hashing, and smart contracts. unauthorized access.

Data Integrity and Security: Smart Contract Implementation:


To ensure the integrity and data The integration of contracts further
protection, the use of SHA-256 algorithm enhanced the safety and performance of
and hash is performed. Through our model for personal identity. Our
cryptographic hash, personal data is analysis demonstrates that smart contracts
converted into particular hash values. Our enabled unchangeable records of identity
verification transactions, that minimizes set of rules, hash functions, and smart
the hazard of fraud. contracts in creating a secure and efficient
blockchain-based personal
In precise, our analysis shows the
identification safety model.
effectiveness of taking benefit of SHA-256

8. CONCLUSION

In conclusion, our Blockchain-Powered consumer manipulation of over-


Personal Identity Security System gives identification records. These systems use
people more control and security over their cryptographic algorithms and
digital identities. By fixing problems in decentralized garages to defend non-public
traditional identity systems, we're making facts from unauthorized entry and facts
the digital world safer and more secure for breaches. Users have more manipulate
everyone. The key blessings of over their identity data, as they can
Blockchain-based Personal Identity manage to get the right of entry to
Security Systems encompass greater permissions and tune the usage of their
security, privateness, transparency, and records.

9. REFERENCE
 https://nevonprojects.com/blockchain-  https://youtu.be/9QeoH6xV_KQ?si=N
based-personal-identity-security- ARWsWb46WP8ftpf
system/  https://lms.simplilearn.com/courses/31
 https://youtu.be/x6vs3NF- 11/Blockchain-Certification-
j40?si=0iCPXuL8IO4jZzwp Training/syllabus
 https://youtu.be/9QeoH6xV_KQ?si=N  https://ieeexplore.ieee.org/abstract/doc
ARWsWb46WP8ftpf ument/8906403
 https://research.cbs.dk/en/publications/  https://www.ncbi.nlm.nih.gov/pmc/arti
bpdims-a-blockchain-based-personal- cles/PMC7013169/
data-and-identity-management-s  https://academicjournals.org/journal/JL
 https://www.sciencedirect.com/science CR/article-full-text-pdf/8599A6F7684
/article/abs/pii/S1084804520302058  https://www.investopedia.com/terms/s/
 https://ieeexplore.ieee.org/abstract/doc satoshi-nakamoto.asp
ument/8476877
 https://www.ussc.gov/sites/default/files of security analysis and design V (pp.
/pdf/training/annual-national-training- 96-120). Springer, Berlin, Heidelberg.
seminar/2018/Emerging_Tech_Bitcoin  O.Jacobovitz. Blockchain for identity
_Crypto.pdf management.,
 Chadwick, D. W. (2009). Federated https://www.cs.bgu.ac.il/
identity management. In Foundations %7Efrankel/TechnicalReports/2016/16
- 02.pdf, 2016
 A. Jøsang and S. Pope. User-Centric AusCERT 2005, Brisbane, Australia,
Identity Management. In Andrew May 2005
Clark., editor, Proceedings of  S. Nakamoto, "Bitcoin: A Peer-to-Peer
Electronic Cash System", 2008.
 http://ijrar.com/upload_issue/ijrar_issu
e_20542993.pdf

You might also like