2022
DOI: 10.3390/su14095400
|View full text |Cite
|
Sign up to set email alerts
|

Land Registry Framework Based on Self-Sovereign Identity (SSI) for Environmental Sustainability

Abstract: Providing a system user with a unique and secure identity is a prerequisite for authentication and authorization aspects of a security system. It is generally understood that the existing digital identity systems store the identity details in centralized databases, and users store the identity details in centralized databases in which users do not have any control over them. These vulnerabilities in the traditional digital identities make them susceptible to various malicious assaults and modifications. Users’… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
4
1

Relationship

2
8

Authors

Journals

citations
Cited by 26 publications
(12 citation statements)
references
References 66 publications
0
5
0
Order By: Relevance
“…Te study tends to prevent counterfeit drugs in the pharmaceutical industry but lacks the required client feedback to combat fake drug distribution. Tis study discussed how blockchain technology could be used to improve clinical research quality [22]. A similar model to Haq and Muselemu was proposed by Sahoo et al [23].…”
Section: Related Reviewsmentioning
confidence: 92%
“…Te study tends to prevent counterfeit drugs in the pharmaceutical industry but lacks the required client feedback to combat fake drug distribution. Tis study discussed how blockchain technology could be used to improve clinical research quality [22]. A similar model to Haq and Muselemu was proposed by Sahoo et al [23].…”
Section: Related Reviewsmentioning
confidence: 92%
“…Reference [26] analyzed the possible privacy information leakage problem in STIX network security threat intelligence sharing standard, and tried to solve the privacy information leakage problem by using an improved data sharing protocol. The above research work has played a role in privacy protection from a unilateral dimension, but cannot protect the privacy information of the intelligence sharing party, the intelligence user and the intelligence-related parties at the same time [27][28][29][30][31][32].…”
Section: Related Workmentioning
confidence: 99%
“…In this section, we mainly review identity authentication solutions, which can be roughly divided into four types, namely, the isolated user identity (SILO) model [5,12,13], federated [7,11,14,15], user-centric [8,[16][17][18][19][20], and self-sovereign identity (SSI) [10,[21][22][23][24][25][26][27][28][29][30]. And the details are as follows:…”
Section: Related Workmentioning
confidence: 99%