• Home
  • Archive
  • Tools
  • Contact Us

The Customize Windows

Technology Journal

  • Cloud Computing
  • Computer
  • Digital Photography
  • Windows 7
  • Archive
  • Cloud Computing
  • Virtualization
  • Computer and Internet
  • Digital Photography
  • Android
  • Sysadmin
  • Electronics
  • Big Data
  • Virtualization
  • Downloads
  • Web Development
  • Apple
  • Android
Advertisement
You are here: Home » Blockchain in Digital Identity

By Abhishek Ghosh July 30, 2020 6:23 pm Updated on July 30, 2020

Blockchain in Digital Identity

Advertisement

With blockchain, individuals and machines can identify themselves in digital networks unambiguously in a tamper-proof manner. In many places, the COVID-19 pandemic praised the creativity of teachers when the school material was conveyed via or WhatsApp. The initiative is considerable, and it highlights the state of digitalization. After all, in an increasingly digital world, many companies are struggling with the problem of trust in digital commerce. Unfortunately, the question of a reliable identity and reliable information on the Internet has not yet been solved sustainably. The loss in online commerce as a result of identity fraud in 2018 amounted many billions. Unfortunately, the chip including digital signature on the card could not change this. The procedure did not prevail. Not even all government agencies adapted digital signature. Banking still relies on signature and 4 digit pin. Identification processes such as live photo can reach some users, with the disadvantage that they are problems to personal data disclosure. In addition to natural persons, things such as machines or legal persons and companies need a clear identification for further digitized processes. If you start research on identity, you inevitably stumble upon the terms:

  • Digital identity
  • Decentralized identity
  • Sovereign identity and
  • Blockchain
Blockchain in Digital Identity

 

Digital Identity

 

Digital identity identifies us on the Internet. But the solutions offered today are not very effective: a separate login must be created for each service. As a rule, this data set is supplemented by personal data and all this ends up in central data silos of the various companies. As a citizen or user, you have no control over your data and their use, nor can you access it directly. The result is a split identity in the network with redundant data. To make matters worse, the validity of allegations is difficult to verify. For example, each bank account must be verified, even though it has long since been carried out for another bank.

 

Self Sovereign Identity (SSI)

 

The catchphrase Self Sovereign Identity (SSI) is about personal sovereignty over one’s own identity in all matters both off and online. It is the responsibility of the individual to have a self-determined view of who is allowed to see or use which personal data for how long.

Advertisement

---

A sovereign identity could be more granular to determine who gets what information. This approach is in stark contrast to today’s usual approaches because it is decentralized in nature: the user manages his data completely without a central authority. Selective sharing guarantees a high level of privacy and sovereignty over its data. The solution to this problem could lie in the blockchain because the protocol enables a decentralized PKI infrastructure (public key infrastructure) and is thus the foundation for a self-sovereign identity or a decentralized identity.

 

Decentralized Identity as a Solution

 

The solution for a sovereign digital identity is the so-called decentralized identity. It acts as a universal key for all online applications – smartphones provide a bridge to the analogue world. This eliminates the individual registration on each website and the management of password and username. In contrast to the popular social logins of Facebook or Google, the data of the users does not lie on the central servers of these providers but remain in full control of the user. However, in many situations, participants in a transaction must be able to rely on the information provided. The car rental company must check the driver’s license before handing over the vehicle key. If it is only available in digital form, it must be able to trust this information. In the digital space, therefore, the question arises as to how a valid identity can be proven sustainably? A solution is needed that:

  • provides secure trust records in real-time and is easy to use;
  • tamper-proof;

Such a digital identity solution could benefit insurance companies, financial service providers, mobility, B2B trading or automotive. The decentralized identity is also particularly interesting for login to web applications and large social media platforms. The Decentralized Identity can serve as a kind of universal account for all web services – the management of password and user names is no longer necessary. Compared to the currently popular social login functions, this solution offers the advantage that the data of the user is not stored on a central server of Google, Facebook and Co. They remain under the sole control of the user. This protects privacy, less trust in third parties is needed.

 

Final Words

 

The users can control their decentralized identity which is free for re-use. This would allow the regulatory concerns of states such as users to be enforced against platforms such as Amazon, Facebook or Google: these companies generate revenue from their users’ data; they are de facto transforming their customers into a product. Regulators and politicians around the world are trying to bring these platforms under control, often with a focus on tax issues. The protection of privacy is lagging. With decentralized identities, states are given a means of collecting taxes while protecting the data of their citizens. This would require undertakings to offer access to the service with the digital identity as a minimum requirement and thus without discrimination. Any additional identity feature may, of course, be requested, for which the platform might have to pay, for example.

This Article Has Been Shared 498 Times!

Facebook Twitter Pinterest
Abhishek Ghosh

About Abhishek Ghosh

Abhishek Ghosh is a Businessman, Orthopaedic Surgeon, Author and Blogger. You can keep touch with him on Twitter - @AbhishekCTRL.

Here’s what we’ve got for you which might like :

Articles Related to Blockchain in Digital Identity

  • What Are the Applications of Blockchain Technology?

    What Are the Applications of Blockchain Technology? The transactions Blockchain ensures properly conducted and recorded need not be just a monetary unit.

  • Importance of Contracts With Consortium Blockchains

    The consortium blockchains offer new opportunities for collaboration between companies. It is important to set clear rules beforehand.

  • Juju Package Manager for Cloud Computing

    Juju is a Package Manager, service orchestration management tool developed by Canonical for development of Cloud Computing of your own. It is Open Source.

  • Visualization of SQL Data in Jupyter Notebook & Embedding in WordPress Post

    Here is How To On Visualization of SQL Data in Jupyter Notebook & Embedding in WordPress Post in Easy Language, in All Steps.

  • Configure Apache With Fail2Ban on Ubuntu 18.04

    Here is How To Configure Apache With Fail2Ban on Ubuntu 18.04 to block more types of malicious attempts towards server to create a practical firewall.

Additionally, performing a search on this website can help you. Also, we have YouTube Videos.

Take The Conversation Further ...

We'd love to know your thoughts on this article.
Meet the Author over on Twitter to join the conversation right now!

If you want to Advertise on our Article or want a Sponsored Article, you are invited to Contact us.

Contact Us

Subscribe To Our Free Newsletter

You can subscribe to our Free Once a Day, Regular Newsletter by clicking the subscribe button below.

Click To Subscribe

Please Confirm the Subscription When Approval Email Will Arrive in Your Email Inbox as Second Step.

Search this website…

 

Popular Articles

Our Homepage is best place to find popular articles!

Here Are Some Good to Read Articles :

  • Cloud Computing Service Models
  • What is Cloud Computing?
  • Cloud Computing and Social Networks in Mobile Space
  • ARM Processor Architecture
  • What Camera Mode to Choose
  • Indispensable MySQL queries for custom fields in WordPress
  • Windows 7 Speech Recognition Scripting Related Tutorials

Social Networks

  • Pinterest (21K Followers)
  • Twitter (5.3k Followers)
  • Facebook (5.7k Followers)
  • LinkedIn (3.7k Followers)
  • YouTube (1.3k Followers)
  • GitHub (Repository)
  • GitHub (Gists)
Looking to publish sponsored article on our website?

Contact us

Recent Posts

  • 5 Sectors That Have Undergone Revamps in Digital Landscape February 24, 2021
  • What You Can Control with a Smartwatch and ESP32 February 23, 2021
  • What Does Data Cleansing Mean? February 21, 2021
  • How to Find the Right Software for Your Company February 20, 2021
  • What is Code Refactoring? February 19, 2021

 

About This Article

Cite this article as: Abhishek Ghosh, "Blockchain in Digital Identity," in The Customize Windows, July 30, 2020, February 25, 2021, https://thecustomizewindows.com/2020/07/blockchain-in-digital-identity/.

Source:The Customize Windows, JiMA.in

 

This website uses cookies. If you do not want to allow us to use cookies and/or non-personalized Ads, kindly clear browser cookies after closing this webpage.

Read Cookie Policy.

PC users can consult Corrine Chorney for Security.

Want to know more about us? Read Notability and Mentions & Our Setup.

Copyright © 2021 - The Customize Windows | dESIGNed by The Customize Windows

Copyright  · Privacy Policy  · Advertising Policy  · Terms of Service  · Refund Policy