CFP last date
20 January 2025
Reseach Article

Aadhaar Identity System using Blockchain Technology

by C. Victoria Priscilla, T. Devasena
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 174 - Number 26
Year of Publication: 2021
Authors: C. Victoria Priscilla, T. Devasena
10.5120/ijca2021921188

C. Victoria Priscilla, T. Devasena . Aadhaar Identity System using Blockchain Technology. International Journal of Computer Applications. 174, 26 ( Mar 2021), 27-32. DOI=10.5120/ijca2021921188

@article{ 10.5120/ijca2021921188,
author = { C. Victoria Priscilla, T. Devasena },
title = { Aadhaar Identity System using Blockchain Technology },
journal = { International Journal of Computer Applications },
issue_date = { Mar 2021 },
volume = { 174 },
number = { 26 },
month = { Mar },
year = { 2021 },
issn = { 0975-8887 },
pages = { 27-32 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume174/number26/31839-2021921188/ },
doi = { 10.5120/ijca2021921188 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:23:10.278820+05:30
%A C. Victoria Priscilla
%A T. Devasena
%T Aadhaar Identity System using Blockchain Technology
%J International Journal of Computer Applications
%@ 0975-8887
%V 174
%N 26
%P 27-32
%D 2021
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Aadhaar is a 12 digit unique identification number, provided to each citizen of India. This includes the biometric data and personal information such as full names, addresses and birthdates. As per the government rule nowadays Aadhaaris linked to the Bank account, PAN Card, Voter ID Card, LPG Connection Card, Ration Card, Mobile number of the citizen of India. In order to ensure the security of Aadhaar, Blockchain technology has the potential to overcome the security and privacy challenges in Aadhaar.Blockchain is a decentralized, cryptographically signed digital ledger where transactions are framed into blocks.The type of information stored in the transactions can be varied (e.g. currency, intellectual property, identity data, location data, etc).Every transaction (and hence block) has a timestamp associated with when it was recorded to the blockchain. Subsequent blocks require the identifier (or hash) of the preceding block, and this is often the link that chains all the blocks together. The distributed consensus nature of the blockchain would prevent malicious attacks, until 51% of the nodes would be compromised. The proposed system AIMS (Aadhaar Identity Management System) provides self sovereign identity to the people through which one can create and control their verifiable credentials without any centralized authority and gives control over how their personal data is shared and used. This article also provides the comparative analysis of consensus algorithm which determines the performance and security of the blockchain system.

References
  1. S. Venkatasubramanian, V. Swarnakamali, J. Kaviya, and A. Vigneshwar, “Aadhaar security through blockchain,” pp. 19–21, 2019.
  2. J. S. Notland, “Blockchain enabled Trust & Transparency in supply chains (Journal format),” Medium, 2017, [Online]. Available: https://medium.com/@jrgensvenneviknotland/blockchain-enabled-trust-transparency-in-supply-chains-journal-format-2744fa4f37d.
  3. S. P.J and G. George, “Blockchain Based Aadhaar Security,” Int. J. Eng. Technol., vol. 7, no. 4.6, p. 398, 2018, doi: 10.14419/ijet.v7i4.6.28450.
  4. R. Nechushtai, M. Elit, and S. M. Systems, “Blockchain Identity Management System Based on Public Dentities Ledger,” Google Patents, vol. 1, no. 12, 2017, [Online]. Available: https://patents.google.com/patent/US9635000B1/en.
  5. L. Lesavre, P. Varin, P. Mell, M. Davidson, and J. Shook, “A Taxonomic Approach to Understanding Emerging Blockchain Identity Management Systems,” 2019, doi: 10.6028/NIST.CSWP.07092019-draft.
  6. P. Dunphy and F. A. P. Petitcolas, “A first look at identity management schemes on the blockchain,” IEEE Secur. Priv., vol. 16, no. 4, pp. 20–29, 2018, doi: 10.1109/MSP.2018.3111247.
  7. X. Zhu and Y. Badr, “Identity Management Systems for the Internet of Things: A Survey Towards Blockchain Solutions,” Sensors (Basel)., vol. 18, no. 12, pp. 1–18, 2018, doi: 10.3390/s18124215.
  8. “IMPACT OF BLOCKCHAIN ON DIGITAL IDENTITY BUILDING TRUST IN THE CYBERWORLD.” Accessed: Sep. 19, 2020. [Online]. Available: https://joom.ag/PgYa.
  9. Y. Liu, Z. Zhao, G. Guo, X. Wang, Z. Tan, and S. Wang, “c,” Proc. - 2017 15th Annu. Conf. Privacy, Secur. Trust. PST 2017, pp. 44–53, 2018, doi: 10.1109/PST.2017.00016.
  10. K. Mudliar and H. Parekh, “A comprehensive integration of national identity with blockchain technology,” Proc. - 2018 Int. Conf. Commun. Inf. Comput. Technol. ICCICT 2018, vol. 2018-Janua, pp. 1–6, 2018, doi: 10.1109/ICCICT.2018.8325891.
  11. R. B. Venkatapur, B. Prabhu, A. Navya, R. Roopini, and S. N. A. S, “Electronic Voting Machine Based On Blockchain Technology and Aadhar Verification,” Int. J. Innov. Eng. Sci., vol. 3, no. 3, pp. 12–15, 2018.
  12. M. S. Ferdous, M. J. M. Chowdhury, M. A. Hoque, and A. Colman, “Blockchain Consensus Algorithms: A Survey,” pp. 1–39, 2020, [Online]. Available: http://arxiv.org/abs/2001.07091.
  13. A. Maetouq, S. M. Daud, N. A. Ahmad, N. Maarop, N. N. A. Sjarif, and H. Abas, “Comparison of hash function algorithms against attacks: A review,” Int. J. Adv. Comput. Sci. Appl., vol. 9, no. 8, pp. 98–103, 2018, doi: 10.14569/ijacsa.2018.090813.
  14. P. P. Pittalia, “A Comparative Study of Hash Algorithms in Cryptography,” Int. J. Comput. Sci. Mob. Comput., vol. 8, no. 6, pp. 147–152, 2019, [Online]. Available: www.ijcsmc.com.
  15. “ECIP-1049: Why Ethereum Classic should Adopt Keccak256 for its Proof of Work Algorithm. | by Alexander Tsankov | Medium.” https://antsankov.medium.com/ecip-1049-why-ethereum-classic-should-adopt-keccak256-for-its-proof-of-work-algorithm-e45aee32d8a9 (accessed Feb. 17, 2021).
  16. E. C. Hunt, S. B. Sproat, R. R. Kitzmiller, E. C. Hunt, S. B. Sproat, and R. R. Kitzmiller, “Implementation Overview,” Nurs. Informatics Implement. Guid., pp. 1–19, 2004, doi: 10.1007/978-1-4757-4343-2_1.
  17. Z. A. Al-Odat, M. Ali, A. Abbas, and S. U. Khan, “Secure Hash Algorithms and the Corresponding FPGA Optimization Techniques,” ACM Comput. Surv., vol. 53, no. 5, 2020, doi: 10.1145/3311724.
  18. N. Popper, “Ethereum, a Virtual Currency, Enables Transactions That Rival Bitcoin’s,” New York Times, Mar. 2016, Accessed: Feb. 17, 2021. [Online]. Available: https://www.nytimes.com/2016/03/28/business/dealbook/ethereum-a-virtual-currency-enables-transactions-that-rival-bitcoins.html.
  19. J. E. de A. Sousa, “An analysis of the fees and pending time correlation in Ethereum,” Int. J. Netw. Manag., no. e2113, 2020, Accessed: Feb. 17, 2021. [Online]. Available: http://dl.ifip.org/db/conf/lanoms/lanoms2019/196411_1.pdf.
Index Terms

Computer Science
Information Sciences

Keywords

Self Sovereign Identity Consensus Algorithms Blockchain and Hashing IPFS (Inter Planetary File System)