2022
DOI: 10.3390/s22134714
|View full text |Cite
|
Sign up to set email alerts
|

Self-Sovereignty Identity Management Model for Smart Healthcare System

Abstract: An identity management system is essential in any organisation to provide quality services to each authenticated user. The smart healthcare system should use reliable identity management to ensure timely service to authorised users. Traditional healthcare uses a paper-based identity system which is converted into centralised identity management in a smart healthcare system. Centralised identity management has security issues such as denial of service attacks, single-point failure, information breaches of patie… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 16 publications
(4 citation statements)
references
References 35 publications
(44 reference statements)
0
4
0
Order By: Relevance
“…When a service provider integrates the SSID platform, it can be the owner of their own identity for their organization; the issuer that authenticates the identity for their users; or the verifier of identity information provided by another owner (another third party may issue the identity). The role varies according to the context of each system's application, but there are three entities in a general system [53].…”
Section: ) the Proposed Ssid Servicementioning
confidence: 99%
“…When a service provider integrates the SSID platform, it can be the owner of their own identity for their organization; the issuer that authenticates the identity for their users; or the verifier of identity information provided by another owner (another third party may issue the identity). The role varies according to the context of each system's application, but there are three entities in a general system [53].…”
Section: ) the Proposed Ssid Servicementioning
confidence: 99%
“…It serves a similar function as the Circle of Trust (CoT) in the FIDM model. Blockchain can be a viable choice for a VDR as it offers a highly tamper-resistant distributed database that is not controlled by any single entity (Bai et al, 2022). Other alternatives include centralized or distributed VDRs (Preukschat and Drummond, 2021), while the technology used to implement the VDR may continue to evolve over time as standards develop.…”
Section: Self-sovereign Idmmentioning
confidence: 99%
“…When compared with the existing studies in literature [7][8][9][10][11], the proposed novel BlockSSI-CRS platform distinguishes itself by empowering employee independence while ensuring data protection, addressing modern digital threats more effectively. By harnessing the power of blockchain, the platform guarantees a more transparent and traceable identity verification process, and integrates with corporate systems.…”
Section: System Design and Architecturementioning
confidence: 99%