SlideShare a Scribd company logo
1 of 60
Download to read offline
PROCEEDINGS | INTERNATIONAL WEBINAR | 25 MAY 2021
© RISHABH GARG
GLOBAL IDENTITY
THROUGH BLOCKCHAIN
RISHABH GARG
BITS - Pilani | Goa | India
36 | VRINDAVAN NAGAR | BHOPAL
© RISHABH GARG | BITS PILANI | GOA
1
2
3
4
5
The Idea of Multipurpose ID
(Generic Information Tracker)
popped-up in 2016
Prime Minister of India
Narendra Modi motivated to
customize it for India Vision 2020
Honored for special
achievements in Science by
Government of India
Registered by National
Innovation, Foundation -
Government of India
Received National Child Award
for Exceptional Achievements by
Honorable President of India
The Idea was presented
at India International
Science Festival 2016
Renamed as Digital ID
with Electronic
Surveillance System
GLOBAL IDENTITY THROUGH BLOCKCHAIN
Our Concern
 Identity provides a gateway to make access to food, shelter, health,
medical care and all such amenities, upon which a citizen has a
legitimate right as human being.
Magnitude of the problem
 Over $ 2.2 billion dollars lost or misused annually in the developing world
due to lack of verifiable ‘first-mile’;
 65.3 million refugees and displaced people world-wide;
 2.5 billion people lack access to banking and credit services;
GLOBAL IDENTITY THROUGH BLOCKCHAIN
© RISHABH GARG | BITS PILANI | GOA
Identity Instruments
 In India, there is no single document that serves as National ID [Garg, 2016], yet
the following documents are issued for specific purposes that work as ID:
• Aadhaar Card • Electoral Photo Identity Card (EPIC)
• Indian Passport • Transfer/Matriculation Certificate
• Overseas Passport • Freedom Fighter Identity Cards
• Ration Card • Service Identity Card
• Birth Certificate • Arms Licenses
• Policy Bond • Overseas Citizenship of India (OCI)
• PAN Card • SC/ST/OBC Certificates
• Driving License • Person of Indian Origin
GLOBAL IDENTITY THROUGH BLOCKCHAIN
© RISHABH GARG | BITS PILANI | GOA
Identity Instruments
Since citizens are provided with different IDs for different purposes, there is a lack
of resemblance in citizen’s profile among different data repositories, causing
discrepancy and recurrence [Garg, 2017]
• Railway Identity Cards • Property Documents
• Student Photo ID • Gas Connection Bill
• Pensioner Photo Card • Bank/ PO Passbooks
• Unique Disability ID • Extract of the Service Record
• Photo Credit Card • Certificate of Identify issued by a
Gazetted Officer or SLR
• Marriage Certificate
• Gazette Notification • Legal Name Change Certificate
GLOBAL IDENTITY THROUGH BLOCKCHAIN
© RISHABH GARG | BITS PILANI | GOA
Problems with Multiple ID
Absence of Single National ID has manifold complications [Garg, 2018]:
 Procure endless number of IDs, certificates, licenses …… ;
 Lengthy procedures and official formalities;
 Periodical renewal, which demands documentation all over again;
 Wastage of paper, time, money and working days;
 Long queues, intervention of proxies and agents;
 Corruption, imposture and suppression of facts;
 Loss of revenue, due to evasion of tax.
GLOBAL IDENTITY THROUGH BLOCKCHAIN
© RISHABH GARG | BITS PILANI | GOA
Quest for National Identity
 For last three decades, there has been a terrific surge of experimentation
for identity.
 Until 1990, Ration Card was a popular tool of Identity.
 In 1993, the Voter ID or EPIC was implemented.
 In 2006, the idea of Universal Identity (UID) was proposed by the
Department of Information Technology, Government of India.
 In 2009, Unique Identification Authority of India (UIDAI) was established
under the aegis of Planning Commission [Garg, 2019].
GLOBAL IDENTITY THROUGH BLOCKCHAIN
© RISHABH GARG | BITS PILANI | GOA
UID Standards
The data used in UID encompasses Biometrics Data
and Demographics Data.
GLOBAL IDENTITY THROUGH BLOCKCHAIN
© RISHABH GARG | BITS PILANI | GOA
UIDAI Ecosystem
USER
UIDAI
AUTHENTICATION
USER AGENCY
AUTHENTICATION
SERVICE AGENCY
AUTHENTICATION
POINT OR POS
GLOBAL IDENTITY THROUGH BLOCKCHAIN
© RISHABH GARG | BITS PILANI | GOA
06
Aadhaar Issued
05
Service delivered
04
Necessary Updates
& Confirmation
03
YES/NO Response
02
AUA/ASA Specific
Communication Protocol
Authentication
Request
01
Process of Authentication
GLOBAL IDENTITY THROUGH BLOCKCHAIN
© RISHABH GARG | BITS PILANI | GOA
Number of UID Generated
1,293,218,604
1,281,357,814
1,275,802,361
1,269,646,921
1,263,791,473
1,257,936,028
6.0 M
4.8 M
3.6 M
2.4 M
1.2 M
0 M
Number
of
Aadhaars
Cumulative
Aadhaars
AUG SEP OCT NOV DEC JAN FEB MAR APR MAY
2019 2020
GLOBAL IDENTITY THROUGH BLOCKCHAIN
© RISHABH GARG | BITS PILANI | GOA
Saturation Level of UID
Total Population (Projected 2021)
1,392,012,604
Saturation Percentage
92.90%
Number of Aadhaar Issued
1,293,218,604
Having No Identity
98,794,000 = 7.10%
GLOBAL IDENTITY THROUGH BLOCKCHAIN
© RISHABH GARG | BITS PILANI | GOA
UIDAI Budget & Expenditure (in Crores)
2009-10
2010-11
2011-12
2012-13
2013-14
2014-15
2015-16
2016-17
2017-18
2018-19
2019-20
0 500 1000 1500 2000 2500 3000
GLOBAL IDENTITY THROUGH BLOCKCHAIN
© RISHABH GARG | BITS PILANI | GOA
UIDAI: Aims & Achievements
UID Number (Aadhaar) was aimed to:
 achieve social inclusion with more efficient public and private service
delivery;
 reduce the large number of fake / duplicate identities; and
 to pave the way for direct benefit transfers.
As on 2021-May-22
 1,293,218,604 users have been enrolled.
 A total expenditure of INR 12,962.02 crores have been incurred over the
last 12 years [UIDAI 2021].
GLOBAL IDENTITY THROUGH BLOCKCHAIN
© RISHABH GARG | BITS PILANI | GOA
Security Issues
 UIDAI admitted that 210 government websites unveiled the Aadhaar details on
internet [Garg, 2020].
 Almost 130 million Aadhar numbers, with other sensitive details, are available
on internet [First Post, 2020].
 Jharkhand Directorate of Social Security leaked Aadhaar details of 1.6 million
people due to technical glitch.
 UIDAI banned about 1,000 operators and filed FIRs against 20 individuals for
dereliction.
 Nearly 4.5 billion data records were stolen, or negotiated worldwide during Jan-
Jul 2018 (Breach Level Index).
GLOBAL IDENTITY THROUGH BLOCKCHAIN
© RISHABH GARG | BITS PILANI | GOA
Privacy Concerns
 In other countries, the Information privacy is protected by comprehensive data
protection laws:
• US Privacy Act, 1974;
• UK Data Protection Act, 1998; and
• US Computer Matching and Privacy Act, 1988
 In India, there is no clear legislative or juridical understanding regarding privacy
of information.
 The Supreme Court has derived the right to privacy from Articles 19(1)(a) and
Article 21 of the Constitution to desist service providers to make Aadhaar
mandatory.
GLOBAL IDENTITY THROUGH BLOCKCHAIN
© RISHABH GARG | BITS PILANI | GOA
Violations
 Despite Court’s verdict, Government has made Aadhaar compulsory in:
Since Aadhaar inherently carries a lot of personal and private information, it eventually defies
the data privacy.
GLOBAL IDENTITY THROUGH BLOCKCHAIN
© RISHABH GARG | BITS PILANI | GOA
It is not a Failure?
 Despite an expenditure of ≥12,962 Cr INR, 98 million marginalized residents, who
are in dire need of access to limited benefits provided by the State, are still living
dispossessed [Garg, 2021].
 Aadhaar, which was imagined as a general proof of identity and address could not
hold ground because various existing forms of identity still continue.
 The use of biometrics has numerous drawbacks. It is inherently fallible for large
scale and the results are often probabilistic.
 Linking of Aadhaar to social schemes has ironically created more barriers for the
poor and deprived.
 In Sep 2013, the Supreme Court of India challenged the constitutional validity of
Aadhaar. In light of the Court’s verdict, Aadhaar lost its ground.
GLOBAL IDENTITY THROUGH BLOCKCHAIN
© RISHABH GARG | BITS PILANI | GOA
Now, What’s the Way-out?
 In order to have secure and private identity, the only solution is digitization.
 Over the years, the online identity have advanced through four major stages:
1 2 3 4
CENTRALIZED
FEDERATED
USER-CENTRIC
SELF
SOVEREIGN
GLOBAL IDENTITY THROUGH BLOCKCHAIN
© RISHABH GARG | BITS PILANI | GOA
Centralized Identity
 Controlled by a single authority, each user needs a new digital identity credential for
every new organization.
Employees
Business Partners
Contractors
Centralized
Identity &
Access
Management
User lifecycle management
Approval workflows
Audit and reporting
Authentication &
Authorization
Identity Access &
Credential Policy
Windows
UNIX
Solaris
CA-TS
SAP
Documents
Business Objects
Entrust
Databases
GLOBAL IDENTITY THROUGH BLOCKCHAIN
© RISHABH GARG | BITS PILANI | GOA
Federated Identity
 Controlled by multiple federated
authorities, which allow users to utilize
the same identity on multiple sites.
User-centric Identity
 Controlled by an individual, across
multiple authorities, without requiring a
federation.
 A user can theoretically register his own
Open ID, for private but lawful activities,
which he can use autonomously.
Parents
Private Life
Hobbies
Social Activities
GLOBAL IDENTITY THROUGH BLOCKCHAIN
© RISHABH GARG | BITS PILANI | GOA
Self-Sovereign Identity
 The user is central to the administration of identity, across any number of
authorities.
Existing Model
Proposed Model
GLOBAL IDENTITY THROUGH BLOCKCHAIN
© RISHABH GARG | BITS PILANI | GOA
Characteristics of Self-Sovereign Identity
1 2 3 4 5 6
Least
amount
of
data
needs
to
be
disclosed
No
censorship
&
ID
deletion
ID
can’t
be
taken
away
from
the
user
Interoperability
ID
used
only
with
user’s
consent
Users
control
their
ID
7
Privacy
&
Confidentiality
GLOBAL IDENTITY THROUGH BLOCKCHAIN
© RISHABH GARG | BITS PILANI | GOA
How can SSI become a reality?
 Identity meta-data can be hashed and stored on a chain-code.
 Information could be available when and when people need it.
 Identity data can be safely & securely recorded and accessed by authorized
parties.
 Trusted partners would provide a secure and immutable network for creating
opportunities for the bottom of the pyramid.
 A distributed ledger across a trust network would prove helpful during critical
life events & civic crisis like COVID-19.
But, what is it ……?
GLOBAL IDENTITY THROUGH BLOCKCHAIN
© RISHABH GARG | BITS PILANI | GOA
……. It’s Blockchain
 The term blockchain is commonly used to refer to a public or permission-
less distributed ledger.
 The blockchain, that maintains a continuously growing list of records or
transactions, provides ledger and smart contract (chain-code) services to
applications.
 In a decentralized identity framework, security becomes the responsibility
of the user, who may determine his or her own security measures.
 Block-chain powered decentralized identity solutions compel hackers to
target discrete data stores, which is expensive and cumbersome.
GLOBAL IDENTITY THROUGH BLOCKCHAIN
© RISHABH GARG | BITS PILANI | GOA
Block : Its Components
GLOBAL IDENTITY THROUGH BLOCKCHAIN
© RISHABH GARG | BITS PILANI | GOA
Hash as a Mathematical Algorithm
GLOBAL IDENTITY THROUGH BLOCKCHAIN
© RISHABH GARG | BITS PILANI | GOA
Public & Private Keys
Personal
Unique private key
tied to unique
personal identifier
Private
An individual
controls his private
key while smart
contracts allow him
to control personal
data
Persistent
As long as an
individual has his
private key, he can
make access to his
accounts and
records.
Portable
Physical artifacts no
longer required
(depending upon
the key
management
technique used).
GLOBAL IDENTITY THROUGH BLOCKCHAIN
© RISHABH GARG | BITS PILANI | GOA
Decentralized Identifiers (DID)
 Recent advancements in block-chain technology allow every public key to have
its own address, which is known as DID.
 A DID is stored on the public ledger along with DID document containing the
public key, any specific credentials, which the identity owner wishes to share,
and the network addresses for interaction.
Scheme
did : example : 123456789abcdefghijklmnopqrstuvwxyz
DID Method DID Method Specific String
GLOBAL IDENTITY THROUGH BLOCKCHAIN
© RISHABH GARG | BITS PILANI | GOA
Evolution of Blockchain
• Satoshi Nakamoto released Bitcoin paper
• The 1st Bitcoin online purchase BTC 10,000 taken place
2009-11
• Ethereum released
• Blockchain technology R3; Ripple blockchain introduced
2012-14
2015-17
2018
2019
2020
• Linux Foundation introduced Hyper-ledger
• JP Morgan launched Quorum blockchain
• 15% financial companies used blockchain
• 95% of companies willing to invest in blockchain
• Blockchain as a service industry started flourishing
• Security Tokens replaced ICOs
• Introduced the concept of GlobalID leveraging
Blockchain Technology (Rishabh Garg, 2020).
GLOBAL IDENTITY THROUGH BLOCKCHAIN
© RISHABH GARG | BITS PILANI | GOA
Blockchain Models
Based on its applications, blockchain is delineated as Blockchain 1.0, 2.0 and
3.0.
 Blockchain 1.0 was restricted to cryptocurrency (bitcoin), for small
payments, foreign exchange and money laundering.
 Blockchain 2.0 comprised smart-contracts, decentralized applications for
banking, stock trading, credit system, supply-chain management, payment
clearing, etc.
 Blockchain 3.0 is suitable for areas like education, health, science,
transportation, logistics and finance.
GLOBAL IDENTITY THROUGH BLOCKCHAIN
© RISHABH GARG | BITS PILANI | GOA
06
The transaction
gets verified and
executed
Working of Blockchain
05
After validation the
block is added to the
chain
04
All nodes validate the
information on block
The block is
broadcasted to all
nodes in the network
03
02
Block representing the
transaction is created
01
The User requests
for a transaction
GLOBAL IDENTITY THROUGH BLOCKCHAIN
© RISHABH GARG | BITS PILANI | GOA
One of the users
(node) requests a
transaction The transaction request
is broadcasted on a P2P
network
The P2P network
validates the
transaction and
user’s status using
known logarithms
Validation
The transaction
is complete
The new block is then added
to the existing blockchain, in
an immutable and persistent
manner
Once verified,
the transaction
is combined with
other
transactions to
create a new
block of data for
the ledger
Working of Blockchain
GLOBAL IDENTITY THROUGH BLOCKCHAIN
© RISHABH GARG | BITS PILANI | GOA
Creating Blockchain Account
GLOBAL IDENTITY THROUGH BLOCKCHAIN
© RISHABH GARG | BITS PILANI | GOA
Adding Peers to Blockchain
GLOBAL IDENTITY THROUGH BLOCKCHAIN
© RISHABH GARG | BITS PILANI | GOA
Checking Accounts
GLOBAL IDENTITY THROUGH BLOCKCHAIN
© RISHABH GARG | BITS PILANI | GOA
Performing Ethereum Operations
GLOBAL IDENTITY THROUGH BLOCKCHAIN
© RISHABH GARG | BITS PILANI | GOA
Input & Output UTXOs References
GLOBAL IDENTITY THROUGH BLOCKCHAIN
© RISHABH GARG | BITS PILANI | GOA
Advantages of Blockchain IAM
Typical IAM Comparative
characters
Blockchain IAM
Honeypots - treasure of information is likely
to be attacked by hackers
Provides anonymity & privacy through
permissioned blockchain network
Users use the same password for different
sites. If one password is stolen, all apps will
be compromised with.
Password protection Encrypted public key creates a secure digital
reference about the identity of the user (a
secured alternative to password)
The use of cloud computing for various
purposes has led to the challenge of
tracking usage of resources across
environments.
Cloud Applications May augment existing single sign on
solutions or be designed to track activity
across platforms.
Multifactor authentication acts as a
challenge to manage due to the
infrastructure requirements to support it.
Blockchain technology can enable MFA
without the need for additional infrastructure
Introduces a challenge of having a single
source of truth, which makes audits difficult
to conduct.
Centralization Transactions are immutable by nature, they
can be used to both store and retrieve data
that needs to be regulated by various
compliance standards.
GLOBAL IDENTITY THROUGH BLOCKCHAIN
© RISHABH GARG | BITS PILANI | GOA
Key characteristics of Blockchain
DISTRIBUTED PERMISSIONED SECURE TRUSTED AUTOMATED
A group of
nodes, or
servers
maintain the
entries without
any central
authority.
In a
permissioned
blockchain,
only appointed
nodes are
authorized to
validate
transactions.
The database
is immutable
and
irreversible.
Transactions,
once made
cannot be
revised or
tampered with.
Distributed
nature of the
network
requires half of
the computer
nodes to reach
a consensus,
to enable
transaction to
occur.
Transactions
occur
automatically;
the conflicting
or double
transactions
do not occur.
GLOBAL IDENTITY THROUGH BLOCKCHAIN
© RISHABH GARG | BITS PILANI | GOA
Comparisons among different types of Blockchain
Property Public blockchain Consortium blockchain Private blockchain
Centralized Decentralized Partially centralized Fully centralized
Consensus process Permission less (anyone can
join the consensus process)
Permissioned Permissioned
Consensus
determination
All miners (each node could
take part in the consensus
process)
Only a selected set of nodes
are responsible for validating
the block
Fully controlled by one
organization that could
determine the final consensus
Read permission Public Depends, could be public or
restricted
Depends, could be public or
restricted
Immutability Nearly impossible to tamper
since records are stored with
a large number of
participants
Could be tampered easily as
there is only limited number
of participants
Could be tampered easily as
there is only limited number
of participants
Efficiency Low (transaction throughput
is limited and the latency is
high because of large
number of nodes on public
blockchain network).
High (with fewer validators,
the system is more efficient).
High (with fewer validators,
the system is more efficient).
GLOBAL IDENTITY THROUGH BLOCKCHAIN
© RISHABH GARG | BITS PILANI | GOA
Comparisons among Typical Consensus Algorithms
Property PoW PoS PBFT DPOS Ripple Tendermint
Node identity
management
Open Open Permissioned Open Open Permissioned
Energy saving No Partial Yes Partial Yes Yes
Tolerated
power
Of adversary
<25%
computing
power
<51%
stake
<33.3%
faulty replicas
<51%
validators
<20%
faulty nodes
in UNL
<33.3%
byzantine
voting power
Example Bitcoin
[Nakamoto,
2008]
Peercoin
[King &
Nadal, 2012]
Hyperledger
Fabric [HPL,
2015]
Bitshares Ripple
[Schwartz
et.al., 2014]
Tendermint
[Kwon, 2014]
GLOBAL IDENTITY THROUGH BLOCKCHAIN
© RISHABH GARG | BITS PILANI | GOA
Challenges DLT needs to overcome
Privacy
Issues
Limited
Evidence of
Global
Impact
Conflict with
Traditional
Approaches
Data
Protection &
Security
Uncertain
Cyber
Regulations
Immature
Technology
GLOBAL IDENTITY THROUGH BLOCKCHAIN
© RISHABH GARG | BITS PILANI | GOA
{ }
Resolver
Adapters
Blockchain Decentralized
Identifier - DID
IPFS
App Associated
Devices
Cloud Provider 1
(CANN Domain)
Home Console Device
(Decentralized Protocol URI)
Home Desktop
(Studio IP)
Cloud Provider 2
(CANN Domain)
Devices are associated
with Identity Hubs
through device specific
public keys
Master ID
(Private Key)
DLT
to
Record
Citizen
Data
GLOBAL IDENTITY THROUGH BLOCKCHAIN
© RISHABH GARG | BITS PILANI | GOA
BLOCKCHAIN
Media Content Uploaded
4. Trust Score
3. KYC
Verification
2. Upload KYC
Documents
1. Register For
Global ID
IPFS
Get ID
Details Of Verification
Saved On Blockchain
Hash Of
Documents
Uploaded
Transaction Details
For Registration Saved
BLOCKCHAIN
Identity
Access
Management
(IAM)
© RISHABH GARG | BITS PILANI | GOA
Identity
Access
through
Blockchain
1. Requesting
access to ID
Blockchain
Smart Contract
Vendor
2. Notification to allow
access to vendor
3. User accepts request
& allow access to read
User’s Device
With App
4. Trust score updated;
Transaction saved
GLOBAL IDENTITY THROUGH BLOCKCHAIN
© RISHABH GARG | BITS PILANI | GOA
Functional Mechanism
Step 1: Installation of Mobile App
 An individual will have to download the mobile app from play store or app
store to fetch his identity.
 After downloading the app in mobile phones, a user will create a profile on
the app.
 Once the profile is created, the user will get the unique ID number which
will help organizations to send or to get the access to user’s identification
documents.
GLOBAL IDENTITY THROUGH BLOCKCHAIN
© RISHABH GARG | BITS PILANI | GOA
Functional Mechanism
Step 2: Uploading the documents
 On having the unique ID number, the user will fetch the government issued
IDs through the app and save them in the IPFS / Private Ledger.
 The app will extract the personal information from these ID’s.
 The user will now have the ownership of his own data. It would help users
to decide what information is to be shared with organizations?
 Without the user’s consents, no information can be shared with any
identity seekers.
GLOBAL IDENTITY THROUGH BLOCKCHAIN
© RISHABH GARG | BITS PILANI | GOA
Functional Mechanism
Issue / Endorsement of Document
1
User would request
certificate using
Private Key
2
Authority will issue
certificate revocation
list
3
Nodes will make
verification
4
Certificate will be
issued thro’ Public Key
GLOBAL IDENTITY THROUGH BLOCKCHAIN
© RISHABH GARG | BITS PILANI | GOA
Functional Mechanism
Step 3: Government or Third-party Access
 A government organization can send a notification to the user (owning the
identity) to make an access to specific details for authentication.
 The authority can use the identifiable information only for authentication
and the individual will be able to trace the purpose for which his PII has
been used.
 Blockchain does not store any user’s data except the transactions made
between the identity holder and third-party.
GLOBAL IDENTITY THROUGH BLOCKCHAIN
© RISHABH GARG | BITS PILANI | GOA
Functional Mechanism
Step 4: Trust Score
 Smart contracts can generate a trust score for a user from the information
provided by him for creating a self-sovereign identity.
 Higher the trust score, higher will be the trustworthiness of an individual.
 This can help organizations validate user’s identity on real-time basis.
 It can save time, money and provide an insight to user’s credibility.
GLOBAL IDENTITY THROUGH BLOCKCHAIN
© RISHABH GARG | BITS PILANI | GOA
Generation
of
Trust
Score
Low Trust Score High Trust Score
User
Blockchain
Trust Score Scale
Based on a user’s trust score, user’s integrity can be determined.
• Using ID on regular basis.
• Validation of details like name,
parent’s name, date of birth,
phone number etc. match
precisely or vary significantly.
• Addition of multiple
documents - Aadhaar, PAN,
Passport, Certificates,
Diplomas, Degrees, etc. on
the app.
• Perfect matches will enhance
the trust score.
• Not using Global ID actively.
• Making frequent changes in
identity profile like name,
parent’s name, date of birth,
gender, religion, etc. .
• Fails to upload relevant
documents on the system or
does not allow access to
government organizations to
verify identity
• Information, from different
sources, does not match.
GLOBAL IDENTITY THROUGH BLOCKCHAIN
© RISHABH GARG | BITS PILANI | GOA
User Optimized Features of Blockchain
 Each registered user on Blockchain IAM system will get a UID.
 UID consists of personal identity information, in encrypted format, stored
on his device, backed by IPFS.
 User can share his UID with any government organization to authenticate
himself through the Blockchain IAM.
 Blockchain IAM system does not store any user’s data. It uses Smart
Contracts to share the PII, and hence data manipulation is impossible.
 No transaction can occur without the explicit consent of the user that adds
security to IAM.
GLOBAL IDENTITY THROUGH BLOCKCHAIN
© RISHABH GARG | BITS PILANI | GOA
User Optimized Features …….
 Decentralization enables the distribution of information on every node in
the network, reducing the chances of SPOF.
 Irrespective of geographical boundaries, the users can get their identity
verified across the globe.
 Blockchain is both cost and time effective.
 Blockchain allows every individual on its network to trace the transactions.
 Every transaction, recorded on the blockchain, has a verifiable authenticity.
However, the identity of the person, involved in transaction, remain
obscured.
GLOBAL IDENTITY THROUGH BLOCKCHAIN
© RISHABH GARG | BITS PILANI | GOA
BLOCKCHAIN
Applications
of
Blockchain
Health Care
Financial
Transactions
Internet of
Things
E-commerce
Trading
Legal Contracts
Travel &
Transportation
Government
Services
Manufacture
Entertainment
© RISHABH GARG | BITS PILANI | GOA
BLOCKCHAIN
Applications
of
Blockchain
in
Government
Sector
Legal Enforcements
Legislation
Records
Bills &
Payments
Welfare
Distribution
Taxation
Security
& Safety
Cyber
Protection
Healthcare
Services
Digitized IDs
Intellectual Property
© RISHABH GARG | BITS PILANI | GOA
BLOCKCHAIN
Applications
of
Blockchain
in
Finance
Investment
e-Banking
Bank Cards
Automated
Teller Machine
e-Payment
Mortgage
Currency
Exchange
Credit History
Insurance
Tax Payment
© RISHABH GARG | BITS PILANI | GOA
One
World
-
One
Identity
e-Passport e-Voting
e-SIGNATURE
e-Registry
e-Verification
e-Tax
e-Travel Ticket
GLOBAL IDENTITY THROUGH BLOCKCHAIN
© RISHABH GARG | BITS PILANI | GOA
Future
State
of
Citizen
Identity
Economic Identity
Assets
Health Land
Credit
Diaspora
Through
Mobile App
Present State Future State
© RISHABH GARG | BITS PILANI | GOA
GLOBAL IDENTITY THROUGH BLOCKCHAIN
References
• Garg, R. Decentralized Applications for Global Networking. Book under peer review process, 2021.
• Garg, R. Blockchain based Decentralized Applications for Multiple Administrative Domain Networking. Engineering Research
Project, BITS - Pilani, KK Birla Goa Campus IN, 2021: 01-69.
• Garg, R. Decentralized Transaction Mechanism based on Smart Contracts (in press) 2021.
• Garg, R. Interplanetary File System for Education and e-Verification (in press) 2021.
• Garg, R. Ethereum based Smart Contracts for Banking & Finance (in press) 2021.
• Garg, R. Self Sovereign Identity using Decentralized Identifiers. Research Oriented Project, 2020: 01-67.
• Garg, R. Digital Identity and Access Management through Distributed Ledger Technology. Open Self-Paced Project, 2020.
• Garg, R. Multipurpose ID: One Nation - One Identity, Indian Society for Technical Education (ISTE) Annual Convention - National
Conference on Recent Advances in Energy, Science & Technology, 2019 (39).
• Garg, R. Multipurpose ID: A Digital Identity to 1.34 Billion Indians. Ideate for India - Creative Solutions using Technology.
National e-Governance Division, Ministry of Electronics & Information Technology, Government of India, 2018.
• Garg, R. Digital ID with Electronic Surveillance System. Innovation registered with National Innovation Foundation -
Autonomous Body of Department of Science & Technology, Government of India, 2018.
• Garg, R. Hi-Tech ID with Digital Tracking System, National Conference on Application of ICT for Built Environment, 2017.
• Garg, R. Generic Information Tracker. 2nd India International Science Festival, New Delhi, 2016.
© RISHABH GARG | BITS PILANI | GOA

More Related Content

What's hot

The Rise of Biometric Smart Cards for the ID Card Industry
The Rise of Biometric Smart Cards for the ID Card IndustryThe Rise of Biometric Smart Cards for the ID Card Industry
The Rise of Biometric Smart Cards for the ID Card IndustryAntonio D'Albore
 
India Stack/Aadhaar Stack
India Stack/Aadhaar StackIndia Stack/Aadhaar Stack
India Stack/Aadhaar StackDevie Mohan
 
Eco [3 c] introduction of national pki-sg-jaejung kim-15_apr10
Eco [3 c] introduction of national pki-sg-jaejung kim-15_apr10Eco [3 c] introduction of national pki-sg-jaejung kim-15_apr10
Eco [3 c] introduction of national pki-sg-jaejung kim-15_apr10Hai Nguyen
 
Identity management in government, mr. iurie turcanu
Identity management in government, mr. iurie turcanuIdentity management in government, mr. iurie turcanu
Identity management in government, mr. iurie turcanuE-Government Center Moldova
 
CASE STUDY ON PKI & BIOMETRIC BASED APPLICATION
CASE STUDY ON PKI & BIOMETRIC BASED APPLICATIONCASE STUDY ON PKI & BIOMETRIC BASED APPLICATION
CASE STUDY ON PKI & BIOMETRIC BASED APPLICATIONPankaj Rane
 
Overall cryptography and pki introduction
Overall cryptography and pki introductionOverall cryptography and pki introduction
Overall cryptography and pki introductionAvirot Mitamura
 
The Rise of Biometric Cards - Edition January 2018
The Rise of Biometric Cards - Edition January 2018The Rise of Biometric Cards - Edition January 2018
The Rise of Biometric Cards - Edition January 2018Antonio D'Albore
 
India Stack pilot - commercialization of techno-creative innovations
India Stack pilot - commercialization of techno-creative innovationsIndia Stack pilot - commercialization of techno-creative innovations
India Stack pilot - commercialization of techno-creative innovationsProductNation/iSPIRT
 
The Rise of Biometric Smart Cards - Edition June 2018
The Rise of Biometric Smart Cards - Edition June 2018The Rise of Biometric Smart Cards - Edition June 2018
The Rise of Biometric Smart Cards - Edition June 2018Antonio D'Albore
 
India's Platforms Leapfrog by Dr Pramod Varma
India's Platforms Leapfrog by Dr Pramod VarmaIndia's Platforms Leapfrog by Dr Pramod Varma
India's Platforms Leapfrog by Dr Pramod VarmaProductNation/iSPIRT
 
Digital signature
Digital signatureDigital signature
Digital signatureRenu Verma
 
What is Digital Signature, Digital Signature FAQ - eMudhra
What is Digital Signature, Digital Signature FAQ - eMudhraWhat is Digital Signature, Digital Signature FAQ - eMudhra
What is Digital Signature, Digital Signature FAQ - eMudhraeMudhra dsc
 

What's hot (20)

The Rise of Biometric Smart Cards for the ID Card Industry
The Rise of Biometric Smart Cards for the ID Card IndustryThe Rise of Biometric Smart Cards for the ID Card Industry
The Rise of Biometric Smart Cards for the ID Card Industry
 
India Stack/Aadhaar Stack
India Stack/Aadhaar StackIndia Stack/Aadhaar Stack
India Stack/Aadhaar Stack
 
Eco [3 c] introduction of national pki-sg-jaejung kim-15_apr10
Eco [3 c] introduction of national pki-sg-jaejung kim-15_apr10Eco [3 c] introduction of national pki-sg-jaejung kim-15_apr10
Eco [3 c] introduction of national pki-sg-jaejung kim-15_apr10
 
E-signing-3
E-signing-3E-signing-3
E-signing-3
 
Identity management in government, mr. iurie turcanu
Identity management in government, mr. iurie turcanuIdentity management in government, mr. iurie turcanu
Identity management in government, mr. iurie turcanu
 
PKI in Korea
PKI in KoreaPKI in Korea
PKI in Korea
 
CASE STUDY ON PKI & BIOMETRIC BASED APPLICATION
CASE STUDY ON PKI & BIOMETRIC BASED APPLICATIONCASE STUDY ON PKI & BIOMETRIC BASED APPLICATION
CASE STUDY ON PKI & BIOMETRIC BASED APPLICATION
 
Triggering the Smart Card Readers Supply Chain
Triggering the Smart Card Readers Supply ChainTriggering the Smart Card Readers Supply Chain
Triggering the Smart Card Readers Supply Chain
 
Overall cryptography and pki introduction
Overall cryptography and pki introductionOverall cryptography and pki introduction
Overall cryptography and pki introduction
 
The Rise of Biometric Cards - Edition January 2018
The Rise of Biometric Cards - Edition January 2018The Rise of Biometric Cards - Edition January 2018
The Rise of Biometric Cards - Edition January 2018
 
India Stack pilot - commercialization of techno-creative innovations
India Stack pilot - commercialization of techno-creative innovationsIndia Stack pilot - commercialization of techno-creative innovations
India Stack pilot - commercialization of techno-creative innovations
 
S K Sinha
S K SinhaS K Sinha
S K Sinha
 
The Rise of Biometric Smart Cards - Edition June 2018
The Rise of Biometric Smart Cards - Edition June 2018The Rise of Biometric Smart Cards - Edition June 2018
The Rise of Biometric Smart Cards - Edition June 2018
 
It act law ppt
It act law pptIt act law ppt
It act law ppt
 
India's Platforms Leapfrog by Dr Pramod Varma
India's Platforms Leapfrog by Dr Pramod VarmaIndia's Platforms Leapfrog by Dr Pramod Varma
India's Platforms Leapfrog by Dr Pramod Varma
 
Digital signature
Digital signatureDigital signature
Digital signature
 
DTF
DTF DTF
DTF
 
What is Digital Signature, Digital Signature FAQ - eMudhra
What is Digital Signature, Digital Signature FAQ - eMudhraWhat is Digital Signature, Digital Signature FAQ - eMudhra
What is Digital Signature, Digital Signature FAQ - eMudhra
 
The Aadhaar Act, 2016
The Aadhaar Act, 2016The Aadhaar Act, 2016
The Aadhaar Act, 2016
 
Advance itt
Advance ittAdvance itt
Advance itt
 

Similar to Global Identity Through Blockchain

apidays LIVE India 2022_The Rise of Open Finance.pptx
apidays LIVE India 2022_The Rise of Open Finance.pptxapidays LIVE India 2022_The Rise of Open Finance.pptx
apidays LIVE India 2022_The Rise of Open Finance.pptxapidays
 
MyInfo Product Journey- GovTech Singapore
MyInfo Product Journey- GovTech SingaporeMyInfo Product Journey- GovTech Singapore
MyInfo Product Journey- GovTech SingaporeNUS-ISS
 
Identity Trust Framework Survey
Identity Trust Framework SurveyIdentity Trust Framework Survey
Identity Trust Framework Surveyadremllc
 
613a1b0c7cdc6424dfb7sdasb13c_PPT - India Case Study 2 final.pptx
613a1b0c7cdc6424dfb7sdasb13c_PPT - India Case Study 2 final.pptx613a1b0c7cdc6424dfb7sdasb13c_PPT - India Case Study 2 final.pptx
613a1b0c7cdc6424dfb7sdasb13c_PPT - India Case Study 2 final.pptxakhil48267
 
Aadhaar (Identity) Innovation ideas
Aadhaar (Identity) Innovation ideasAadhaar (Identity) Innovation ideas
Aadhaar (Identity) Innovation ideasShrikant Karwa
 
Multi purpose ID : A Digital Identity to 134 Crore Indians
Multi purpose ID : A Digital Identity to 134 Crore IndiansMulti purpose ID : A Digital Identity to 134 Crore Indians
Multi purpose ID : A Digital Identity to 134 Crore IndiansRishabh Garg
 
Introduction to FIDO's Identity Verification & Binding Initiative
Introduction to FIDO's Identity Verification & Binding Initiative Introduction to FIDO's Identity Verification & Binding Initiative
Introduction to FIDO's Identity Verification & Binding Initiative FIDO Alliance
 
Callcredit's Fraud Summit 2016 - Identity verification stream
Callcredit's Fraud Summit 2016 - Identity verification streamCallcredit's Fraud Summit 2016 - Identity verification stream
Callcredit's Fraud Summit 2016 - Identity verification streamCallcredit123
 
Digital Lending in India
Digital Lending in IndiaDigital Lending in India
Digital Lending in IndiaSam Ghosh
 
Biometrics for Payment Authentication
Biometrics for Payment AuthenticationBiometrics for Payment Authentication
Biometrics for Payment AuthenticationFIDO Alliance
 
apidays New York - Discussing the significance of API standardization, Dinesh...
apidays New York - Discussing the significance of API standardization, Dinesh...apidays New York - Discussing the significance of API standardization, Dinesh...
apidays New York - Discussing the significance of API standardization, Dinesh...apidays
 
Digital Identity In Government
Digital Identity In GovernmentDigital Identity In Government
Digital Identity In GovernmentFIDO Alliance
 
apidays LIVE JAKARTA - How National ID accelerates the digital economy by Rah...
apidays LIVE JAKARTA - How National ID accelerates the digital economy by Rah...apidays LIVE JAKARTA - How National ID accelerates the digital economy by Rah...
apidays LIVE JAKARTA - How National ID accelerates the digital economy by Rah...apidays
 
Future of digital identity programme summary - 19 mar 2019 lr
Future of digital identity   programme summary - 19 mar 2019 lrFuture of digital identity   programme summary - 19 mar 2019 lr
Future of digital identity programme summary - 19 mar 2019 lrFuture Agenda
 
Strong Customer Authentication & Biometrics
Strong Customer Authentication & BiometricsStrong Customer Authentication & Biometrics
Strong Customer Authentication & BiometricsFIDO Alliance
 
Javelin Research's State of Strong Authentication 2019 Report Webinar
Javelin Research's State of Strong Authentication 2019 Report Webinar Javelin Research's State of Strong Authentication 2019 Report Webinar
Javelin Research's State of Strong Authentication 2019 Report Webinar FIDO Alliance
 
SPM SUMMIT NESL.pdf
SPM SUMMIT NESL.pdfSPM SUMMIT NESL.pdf
SPM SUMMIT NESL.pdfISPMAIndia
 
An effective data management portal for 1.21 billion residents of India.
An effective data management portal for 1.21 billion residents of India.An effective data management portal for 1.21 billion residents of India.
An effective data management portal for 1.21 billion residents of India.Mindtree Ltd.
 

Similar to Global Identity Through Blockchain (20)

apidays LIVE India 2022_The Rise of Open Finance.pptx
apidays LIVE India 2022_The Rise of Open Finance.pptxapidays LIVE India 2022_The Rise of Open Finance.pptx
apidays LIVE India 2022_The Rise of Open Finance.pptx
 
MyInfo Product Journey- GovTech Singapore
MyInfo Product Journey- GovTech SingaporeMyInfo Product Journey- GovTech Singapore
MyInfo Product Journey- GovTech Singapore
 
Identity Trust Framework Survey
Identity Trust Framework SurveyIdentity Trust Framework Survey
Identity Trust Framework Survey
 
613a1b0c7cdc6424dfb7sdasb13c_PPT - India Case Study 2 final.pptx
613a1b0c7cdc6424dfb7sdasb13c_PPT - India Case Study 2 final.pptx613a1b0c7cdc6424dfb7sdasb13c_PPT - India Case Study 2 final.pptx
613a1b0c7cdc6424dfb7sdasb13c_PPT - India Case Study 2 final.pptx
 
GHANA ToC2
GHANA ToC2GHANA ToC2
GHANA ToC2
 
Aadhaar (Identity) Innovation ideas
Aadhaar (Identity) Innovation ideasAadhaar (Identity) Innovation ideas
Aadhaar (Identity) Innovation ideas
 
Multi purpose ID : A Digital Identity to 134 Crore Indians
Multi purpose ID : A Digital Identity to 134 Crore IndiansMulti purpose ID : A Digital Identity to 134 Crore Indians
Multi purpose ID : A Digital Identity to 134 Crore Indians
 
Introduction to FIDO's Identity Verification & Binding Initiative
Introduction to FIDO's Identity Verification & Binding Initiative Introduction to FIDO's Identity Verification & Binding Initiative
Introduction to FIDO's Identity Verification & Binding Initiative
 
Callcredit's Fraud Summit 2016 - Identity verification stream
Callcredit's Fraud Summit 2016 - Identity verification streamCallcredit's Fraud Summit 2016 - Identity verification stream
Callcredit's Fraud Summit 2016 - Identity verification stream
 
Digital Lending in India
Digital Lending in IndiaDigital Lending in India
Digital Lending in India
 
Biometrics for Payment Authentication
Biometrics for Payment AuthenticationBiometrics for Payment Authentication
Biometrics for Payment Authentication
 
apidays New York - Discussing the significance of API standardization, Dinesh...
apidays New York - Discussing the significance of API standardization, Dinesh...apidays New York - Discussing the significance of API standardization, Dinesh...
apidays New York - Discussing the significance of API standardization, Dinesh...
 
Digital Identity In Government
Digital Identity In GovernmentDigital Identity In Government
Digital Identity In Government
 
apidays LIVE JAKARTA - How National ID accelerates the digital economy by Rah...
apidays LIVE JAKARTA - How National ID accelerates the digital economy by Rah...apidays LIVE JAKARTA - How National ID accelerates the digital economy by Rah...
apidays LIVE JAKARTA - How National ID accelerates the digital economy by Rah...
 
Future of digital identity programme summary - 19 mar 2019 lr
Future of digital identity   programme summary - 19 mar 2019 lrFuture of digital identity   programme summary - 19 mar 2019 lr
Future of digital identity programme summary - 19 mar 2019 lr
 
Strong Customer Authentication & Biometrics
Strong Customer Authentication & BiometricsStrong Customer Authentication & Biometrics
Strong Customer Authentication & Biometrics
 
Javelin Research's State of Strong Authentication 2019 Report Webinar
Javelin Research's State of Strong Authentication 2019 Report Webinar Javelin Research's State of Strong Authentication 2019 Report Webinar
Javelin Research's State of Strong Authentication 2019 Report Webinar
 
SPM SUMMIT NESL.pdf
SPM SUMMIT NESL.pdfSPM SUMMIT NESL.pdf
SPM SUMMIT NESL.pdf
 
5 nov gsma_eema
5 nov gsma_eema5 nov gsma_eema
5 nov gsma_eema
 
An effective data management portal for 1.21 billion residents of India.
An effective data management portal for 1.21 billion residents of India.An effective data management portal for 1.21 billion residents of India.
An effective data management portal for 1.21 billion residents of India.
 

More from Rishabh Garg

Stocks : Technical Analysis
Stocks : Technical AnalysisStocks : Technical Analysis
Stocks : Technical AnalysisRishabh Garg
 
International Conference | Artificial Intelligence & Machine Learning
International Conference | Artificial Intelligence & Machine LearningInternational Conference | Artificial Intelligence & Machine Learning
International Conference | Artificial Intelligence & Machine LearningRishabh Garg
 
Python Library using impedance processing
Python Library using impedance processingPython Library using impedance processing
Python Library using impedance processingRishabh Garg
 
Fault Detection using Python
Fault Detection using PythonFault Detection using Python
Fault Detection using PythonRishabh Garg
 
Documentation and Deployment through Python Libraries
Documentation and Deployment through Python LibrariesDocumentation and Deployment through Python Libraries
Documentation and Deployment through Python LibrariesRishabh Garg
 
International Talk on Technical Analysis
International Talk on Technical AnalysisInternational Talk on Technical Analysis
International Talk on Technical AnalysisRishabh Garg
 
Machine Learning Applications
Machine Learning ApplicationsMachine Learning Applications
Machine Learning ApplicationsRishabh Garg
 
NAAC : Assessment & Accreditation
NAAC : Assessment & AccreditationNAAC : Assessment & Accreditation
NAAC : Assessment & AccreditationRishabh Garg
 
NAAC : Accreditation Process
NAAC : Accreditation ProcessNAAC : Accreditation Process
NAAC : Accreditation ProcessRishabh Garg
 

More from Rishabh Garg (12)

Stocks : Technical Analysis
Stocks : Technical AnalysisStocks : Technical Analysis
Stocks : Technical Analysis
 
International Conference | Artificial Intelligence & Machine Learning
International Conference | Artificial Intelligence & Machine LearningInternational Conference | Artificial Intelligence & Machine Learning
International Conference | Artificial Intelligence & Machine Learning
 
Biosensors
BiosensorsBiosensors
Biosensors
 
Python Library using impedance processing
Python Library using impedance processingPython Library using impedance processing
Python Library using impedance processing
 
Fault Detection using Python
Fault Detection using PythonFault Detection using Python
Fault Detection using Python
 
Documentation and Deployment through Python Libraries
Documentation and Deployment through Python LibrariesDocumentation and Deployment through Python Libraries
Documentation and Deployment through Python Libraries
 
International Talk on Technical Analysis
International Talk on Technical AnalysisInternational Talk on Technical Analysis
International Talk on Technical Analysis
 
Machine Learning Applications
Machine Learning ApplicationsMachine Learning Applications
Machine Learning Applications
 
NAAC : Assessment & Accreditation
NAAC : Assessment & AccreditationNAAC : Assessment & Accreditation
NAAC : Assessment & Accreditation
 
NAAC : Accreditation Process
NAAC : Accreditation ProcessNAAC : Accreditation Process
NAAC : Accreditation Process
 
Gene cloning
Gene cloningGene cloning
Gene cloning
 
Cancer
Cancer Cancer
Cancer
 

Recently uploaded

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

Global Identity Through Blockchain

  • 1. PROCEEDINGS | INTERNATIONAL WEBINAR | 25 MAY 2021 © RISHABH GARG GLOBAL IDENTITY THROUGH BLOCKCHAIN RISHABH GARG BITS - Pilani | Goa | India 36 | VRINDAVAN NAGAR | BHOPAL
  • 2. © RISHABH GARG | BITS PILANI | GOA 1 2 3 4 5 The Idea of Multipurpose ID (Generic Information Tracker) popped-up in 2016 Prime Minister of India Narendra Modi motivated to customize it for India Vision 2020 Honored for special achievements in Science by Government of India Registered by National Innovation, Foundation - Government of India Received National Child Award for Exceptional Achievements by Honorable President of India The Idea was presented at India International Science Festival 2016 Renamed as Digital ID with Electronic Surveillance System GLOBAL IDENTITY THROUGH BLOCKCHAIN
  • 3. Our Concern  Identity provides a gateway to make access to food, shelter, health, medical care and all such amenities, upon which a citizen has a legitimate right as human being. Magnitude of the problem  Over $ 2.2 billion dollars lost or misused annually in the developing world due to lack of verifiable ‘first-mile’;  65.3 million refugees and displaced people world-wide;  2.5 billion people lack access to banking and credit services; GLOBAL IDENTITY THROUGH BLOCKCHAIN © RISHABH GARG | BITS PILANI | GOA
  • 4. Identity Instruments  In India, there is no single document that serves as National ID [Garg, 2016], yet the following documents are issued for specific purposes that work as ID: • Aadhaar Card • Electoral Photo Identity Card (EPIC) • Indian Passport • Transfer/Matriculation Certificate • Overseas Passport • Freedom Fighter Identity Cards • Ration Card • Service Identity Card • Birth Certificate • Arms Licenses • Policy Bond • Overseas Citizenship of India (OCI) • PAN Card • SC/ST/OBC Certificates • Driving License • Person of Indian Origin GLOBAL IDENTITY THROUGH BLOCKCHAIN © RISHABH GARG | BITS PILANI | GOA
  • 5. Identity Instruments Since citizens are provided with different IDs for different purposes, there is a lack of resemblance in citizen’s profile among different data repositories, causing discrepancy and recurrence [Garg, 2017] • Railway Identity Cards • Property Documents • Student Photo ID • Gas Connection Bill • Pensioner Photo Card • Bank/ PO Passbooks • Unique Disability ID • Extract of the Service Record • Photo Credit Card • Certificate of Identify issued by a Gazetted Officer or SLR • Marriage Certificate • Gazette Notification • Legal Name Change Certificate GLOBAL IDENTITY THROUGH BLOCKCHAIN © RISHABH GARG | BITS PILANI | GOA
  • 6. Problems with Multiple ID Absence of Single National ID has manifold complications [Garg, 2018]:  Procure endless number of IDs, certificates, licenses …… ;  Lengthy procedures and official formalities;  Periodical renewal, which demands documentation all over again;  Wastage of paper, time, money and working days;  Long queues, intervention of proxies and agents;  Corruption, imposture and suppression of facts;  Loss of revenue, due to evasion of tax. GLOBAL IDENTITY THROUGH BLOCKCHAIN © RISHABH GARG | BITS PILANI | GOA
  • 7. Quest for National Identity  For last three decades, there has been a terrific surge of experimentation for identity.  Until 1990, Ration Card was a popular tool of Identity.  In 1993, the Voter ID or EPIC was implemented.  In 2006, the idea of Universal Identity (UID) was proposed by the Department of Information Technology, Government of India.  In 2009, Unique Identification Authority of India (UIDAI) was established under the aegis of Planning Commission [Garg, 2019]. GLOBAL IDENTITY THROUGH BLOCKCHAIN © RISHABH GARG | BITS PILANI | GOA
  • 8. UID Standards The data used in UID encompasses Biometrics Data and Demographics Data. GLOBAL IDENTITY THROUGH BLOCKCHAIN © RISHABH GARG | BITS PILANI | GOA
  • 9. UIDAI Ecosystem USER UIDAI AUTHENTICATION USER AGENCY AUTHENTICATION SERVICE AGENCY AUTHENTICATION POINT OR POS GLOBAL IDENTITY THROUGH BLOCKCHAIN © RISHABH GARG | BITS PILANI | GOA
  • 10. 06 Aadhaar Issued 05 Service delivered 04 Necessary Updates & Confirmation 03 YES/NO Response 02 AUA/ASA Specific Communication Protocol Authentication Request 01 Process of Authentication GLOBAL IDENTITY THROUGH BLOCKCHAIN © RISHABH GARG | BITS PILANI | GOA
  • 11. Number of UID Generated 1,293,218,604 1,281,357,814 1,275,802,361 1,269,646,921 1,263,791,473 1,257,936,028 6.0 M 4.8 M 3.6 M 2.4 M 1.2 M 0 M Number of Aadhaars Cumulative Aadhaars AUG SEP OCT NOV DEC JAN FEB MAR APR MAY 2019 2020 GLOBAL IDENTITY THROUGH BLOCKCHAIN © RISHABH GARG | BITS PILANI | GOA
  • 12. Saturation Level of UID Total Population (Projected 2021) 1,392,012,604 Saturation Percentage 92.90% Number of Aadhaar Issued 1,293,218,604 Having No Identity 98,794,000 = 7.10% GLOBAL IDENTITY THROUGH BLOCKCHAIN © RISHABH GARG | BITS PILANI | GOA
  • 13. UIDAI Budget & Expenditure (in Crores) 2009-10 2010-11 2011-12 2012-13 2013-14 2014-15 2015-16 2016-17 2017-18 2018-19 2019-20 0 500 1000 1500 2000 2500 3000 GLOBAL IDENTITY THROUGH BLOCKCHAIN © RISHABH GARG | BITS PILANI | GOA
  • 14. UIDAI: Aims & Achievements UID Number (Aadhaar) was aimed to:  achieve social inclusion with more efficient public and private service delivery;  reduce the large number of fake / duplicate identities; and  to pave the way for direct benefit transfers. As on 2021-May-22  1,293,218,604 users have been enrolled.  A total expenditure of INR 12,962.02 crores have been incurred over the last 12 years [UIDAI 2021]. GLOBAL IDENTITY THROUGH BLOCKCHAIN © RISHABH GARG | BITS PILANI | GOA
  • 15. Security Issues  UIDAI admitted that 210 government websites unveiled the Aadhaar details on internet [Garg, 2020].  Almost 130 million Aadhar numbers, with other sensitive details, are available on internet [First Post, 2020].  Jharkhand Directorate of Social Security leaked Aadhaar details of 1.6 million people due to technical glitch.  UIDAI banned about 1,000 operators and filed FIRs against 20 individuals for dereliction.  Nearly 4.5 billion data records were stolen, or negotiated worldwide during Jan- Jul 2018 (Breach Level Index). GLOBAL IDENTITY THROUGH BLOCKCHAIN © RISHABH GARG | BITS PILANI | GOA
  • 16. Privacy Concerns  In other countries, the Information privacy is protected by comprehensive data protection laws: • US Privacy Act, 1974; • UK Data Protection Act, 1998; and • US Computer Matching and Privacy Act, 1988  In India, there is no clear legislative or juridical understanding regarding privacy of information.  The Supreme Court has derived the right to privacy from Articles 19(1)(a) and Article 21 of the Constitution to desist service providers to make Aadhaar mandatory. GLOBAL IDENTITY THROUGH BLOCKCHAIN © RISHABH GARG | BITS PILANI | GOA
  • 17. Violations  Despite Court’s verdict, Government has made Aadhaar compulsory in: Since Aadhaar inherently carries a lot of personal and private information, it eventually defies the data privacy. GLOBAL IDENTITY THROUGH BLOCKCHAIN © RISHABH GARG | BITS PILANI | GOA
  • 18. It is not a Failure?  Despite an expenditure of ≥12,962 Cr INR, 98 million marginalized residents, who are in dire need of access to limited benefits provided by the State, are still living dispossessed [Garg, 2021].  Aadhaar, which was imagined as a general proof of identity and address could not hold ground because various existing forms of identity still continue.  The use of biometrics has numerous drawbacks. It is inherently fallible for large scale and the results are often probabilistic.  Linking of Aadhaar to social schemes has ironically created more barriers for the poor and deprived.  In Sep 2013, the Supreme Court of India challenged the constitutional validity of Aadhaar. In light of the Court’s verdict, Aadhaar lost its ground. GLOBAL IDENTITY THROUGH BLOCKCHAIN © RISHABH GARG | BITS PILANI | GOA
  • 19. Now, What’s the Way-out?  In order to have secure and private identity, the only solution is digitization.  Over the years, the online identity have advanced through four major stages: 1 2 3 4 CENTRALIZED FEDERATED USER-CENTRIC SELF SOVEREIGN GLOBAL IDENTITY THROUGH BLOCKCHAIN © RISHABH GARG | BITS PILANI | GOA
  • 20. Centralized Identity  Controlled by a single authority, each user needs a new digital identity credential for every new organization. Employees Business Partners Contractors Centralized Identity & Access Management User lifecycle management Approval workflows Audit and reporting Authentication & Authorization Identity Access & Credential Policy Windows UNIX Solaris CA-TS SAP Documents Business Objects Entrust Databases GLOBAL IDENTITY THROUGH BLOCKCHAIN © RISHABH GARG | BITS PILANI | GOA
  • 21. Federated Identity  Controlled by multiple federated authorities, which allow users to utilize the same identity on multiple sites. User-centric Identity  Controlled by an individual, across multiple authorities, without requiring a federation.  A user can theoretically register his own Open ID, for private but lawful activities, which he can use autonomously. Parents Private Life Hobbies Social Activities GLOBAL IDENTITY THROUGH BLOCKCHAIN © RISHABH GARG | BITS PILANI | GOA
  • 22. Self-Sovereign Identity  The user is central to the administration of identity, across any number of authorities. Existing Model Proposed Model GLOBAL IDENTITY THROUGH BLOCKCHAIN © RISHABH GARG | BITS PILANI | GOA
  • 23. Characteristics of Self-Sovereign Identity 1 2 3 4 5 6 Least amount of data needs to be disclosed No censorship & ID deletion ID can’t be taken away from the user Interoperability ID used only with user’s consent Users control their ID 7 Privacy & Confidentiality GLOBAL IDENTITY THROUGH BLOCKCHAIN © RISHABH GARG | BITS PILANI | GOA
  • 24. How can SSI become a reality?  Identity meta-data can be hashed and stored on a chain-code.  Information could be available when and when people need it.  Identity data can be safely & securely recorded and accessed by authorized parties.  Trusted partners would provide a secure and immutable network for creating opportunities for the bottom of the pyramid.  A distributed ledger across a trust network would prove helpful during critical life events & civic crisis like COVID-19. But, what is it ……? GLOBAL IDENTITY THROUGH BLOCKCHAIN © RISHABH GARG | BITS PILANI | GOA
  • 25. ……. It’s Blockchain  The term blockchain is commonly used to refer to a public or permission- less distributed ledger.  The blockchain, that maintains a continuously growing list of records or transactions, provides ledger and smart contract (chain-code) services to applications.  In a decentralized identity framework, security becomes the responsibility of the user, who may determine his or her own security measures.  Block-chain powered decentralized identity solutions compel hackers to target discrete data stores, which is expensive and cumbersome. GLOBAL IDENTITY THROUGH BLOCKCHAIN © RISHABH GARG | BITS PILANI | GOA
  • 26. Block : Its Components GLOBAL IDENTITY THROUGH BLOCKCHAIN © RISHABH GARG | BITS PILANI | GOA
  • 27. Hash as a Mathematical Algorithm GLOBAL IDENTITY THROUGH BLOCKCHAIN © RISHABH GARG | BITS PILANI | GOA
  • 28. Public & Private Keys Personal Unique private key tied to unique personal identifier Private An individual controls his private key while smart contracts allow him to control personal data Persistent As long as an individual has his private key, he can make access to his accounts and records. Portable Physical artifacts no longer required (depending upon the key management technique used). GLOBAL IDENTITY THROUGH BLOCKCHAIN © RISHABH GARG | BITS PILANI | GOA
  • 29. Decentralized Identifiers (DID)  Recent advancements in block-chain technology allow every public key to have its own address, which is known as DID.  A DID is stored on the public ledger along with DID document containing the public key, any specific credentials, which the identity owner wishes to share, and the network addresses for interaction. Scheme did : example : 123456789abcdefghijklmnopqrstuvwxyz DID Method DID Method Specific String GLOBAL IDENTITY THROUGH BLOCKCHAIN © RISHABH GARG | BITS PILANI | GOA
  • 30. Evolution of Blockchain • Satoshi Nakamoto released Bitcoin paper • The 1st Bitcoin online purchase BTC 10,000 taken place 2009-11 • Ethereum released • Blockchain technology R3; Ripple blockchain introduced 2012-14 2015-17 2018 2019 2020 • Linux Foundation introduced Hyper-ledger • JP Morgan launched Quorum blockchain • 15% financial companies used blockchain • 95% of companies willing to invest in blockchain • Blockchain as a service industry started flourishing • Security Tokens replaced ICOs • Introduced the concept of GlobalID leveraging Blockchain Technology (Rishabh Garg, 2020). GLOBAL IDENTITY THROUGH BLOCKCHAIN © RISHABH GARG | BITS PILANI | GOA
  • 31. Blockchain Models Based on its applications, blockchain is delineated as Blockchain 1.0, 2.0 and 3.0.  Blockchain 1.0 was restricted to cryptocurrency (bitcoin), for small payments, foreign exchange and money laundering.  Blockchain 2.0 comprised smart-contracts, decentralized applications for banking, stock trading, credit system, supply-chain management, payment clearing, etc.  Blockchain 3.0 is suitable for areas like education, health, science, transportation, logistics and finance. GLOBAL IDENTITY THROUGH BLOCKCHAIN © RISHABH GARG | BITS PILANI | GOA
  • 32. 06 The transaction gets verified and executed Working of Blockchain 05 After validation the block is added to the chain 04 All nodes validate the information on block The block is broadcasted to all nodes in the network 03 02 Block representing the transaction is created 01 The User requests for a transaction GLOBAL IDENTITY THROUGH BLOCKCHAIN © RISHABH GARG | BITS PILANI | GOA
  • 33. One of the users (node) requests a transaction The transaction request is broadcasted on a P2P network The P2P network validates the transaction and user’s status using known logarithms Validation The transaction is complete The new block is then added to the existing blockchain, in an immutable and persistent manner Once verified, the transaction is combined with other transactions to create a new block of data for the ledger Working of Blockchain GLOBAL IDENTITY THROUGH BLOCKCHAIN © RISHABH GARG | BITS PILANI | GOA
  • 34. Creating Blockchain Account GLOBAL IDENTITY THROUGH BLOCKCHAIN © RISHABH GARG | BITS PILANI | GOA
  • 35. Adding Peers to Blockchain GLOBAL IDENTITY THROUGH BLOCKCHAIN © RISHABH GARG | BITS PILANI | GOA
  • 36. Checking Accounts GLOBAL IDENTITY THROUGH BLOCKCHAIN © RISHABH GARG | BITS PILANI | GOA
  • 37. Performing Ethereum Operations GLOBAL IDENTITY THROUGH BLOCKCHAIN © RISHABH GARG | BITS PILANI | GOA
  • 38. Input & Output UTXOs References GLOBAL IDENTITY THROUGH BLOCKCHAIN © RISHABH GARG | BITS PILANI | GOA
  • 39. Advantages of Blockchain IAM Typical IAM Comparative characters Blockchain IAM Honeypots - treasure of information is likely to be attacked by hackers Provides anonymity & privacy through permissioned blockchain network Users use the same password for different sites. If one password is stolen, all apps will be compromised with. Password protection Encrypted public key creates a secure digital reference about the identity of the user (a secured alternative to password) The use of cloud computing for various purposes has led to the challenge of tracking usage of resources across environments. Cloud Applications May augment existing single sign on solutions or be designed to track activity across platforms. Multifactor authentication acts as a challenge to manage due to the infrastructure requirements to support it. Blockchain technology can enable MFA without the need for additional infrastructure Introduces a challenge of having a single source of truth, which makes audits difficult to conduct. Centralization Transactions are immutable by nature, they can be used to both store and retrieve data that needs to be regulated by various compliance standards. GLOBAL IDENTITY THROUGH BLOCKCHAIN © RISHABH GARG | BITS PILANI | GOA
  • 40. Key characteristics of Blockchain DISTRIBUTED PERMISSIONED SECURE TRUSTED AUTOMATED A group of nodes, or servers maintain the entries without any central authority. In a permissioned blockchain, only appointed nodes are authorized to validate transactions. The database is immutable and irreversible. Transactions, once made cannot be revised or tampered with. Distributed nature of the network requires half of the computer nodes to reach a consensus, to enable transaction to occur. Transactions occur automatically; the conflicting or double transactions do not occur. GLOBAL IDENTITY THROUGH BLOCKCHAIN © RISHABH GARG | BITS PILANI | GOA
  • 41. Comparisons among different types of Blockchain Property Public blockchain Consortium blockchain Private blockchain Centralized Decentralized Partially centralized Fully centralized Consensus process Permission less (anyone can join the consensus process) Permissioned Permissioned Consensus determination All miners (each node could take part in the consensus process) Only a selected set of nodes are responsible for validating the block Fully controlled by one organization that could determine the final consensus Read permission Public Depends, could be public or restricted Depends, could be public or restricted Immutability Nearly impossible to tamper since records are stored with a large number of participants Could be tampered easily as there is only limited number of participants Could be tampered easily as there is only limited number of participants Efficiency Low (transaction throughput is limited and the latency is high because of large number of nodes on public blockchain network). High (with fewer validators, the system is more efficient). High (with fewer validators, the system is more efficient). GLOBAL IDENTITY THROUGH BLOCKCHAIN © RISHABH GARG | BITS PILANI | GOA
  • 42. Comparisons among Typical Consensus Algorithms Property PoW PoS PBFT DPOS Ripple Tendermint Node identity management Open Open Permissioned Open Open Permissioned Energy saving No Partial Yes Partial Yes Yes Tolerated power Of adversary <25% computing power <51% stake <33.3% faulty replicas <51% validators <20% faulty nodes in UNL <33.3% byzantine voting power Example Bitcoin [Nakamoto, 2008] Peercoin [King & Nadal, 2012] Hyperledger Fabric [HPL, 2015] Bitshares Ripple [Schwartz et.al., 2014] Tendermint [Kwon, 2014] GLOBAL IDENTITY THROUGH BLOCKCHAIN © RISHABH GARG | BITS PILANI | GOA
  • 43. Challenges DLT needs to overcome Privacy Issues Limited Evidence of Global Impact Conflict with Traditional Approaches Data Protection & Security Uncertain Cyber Regulations Immature Technology GLOBAL IDENTITY THROUGH BLOCKCHAIN © RISHABH GARG | BITS PILANI | GOA
  • 44. { } Resolver Adapters Blockchain Decentralized Identifier - DID IPFS App Associated Devices Cloud Provider 1 (CANN Domain) Home Console Device (Decentralized Protocol URI) Home Desktop (Studio IP) Cloud Provider 2 (CANN Domain) Devices are associated with Identity Hubs through device specific public keys Master ID (Private Key) DLT to Record Citizen Data GLOBAL IDENTITY THROUGH BLOCKCHAIN © RISHABH GARG | BITS PILANI | GOA
  • 45. BLOCKCHAIN Media Content Uploaded 4. Trust Score 3. KYC Verification 2. Upload KYC Documents 1. Register For Global ID IPFS Get ID Details Of Verification Saved On Blockchain Hash Of Documents Uploaded Transaction Details For Registration Saved BLOCKCHAIN Identity Access Management (IAM) © RISHABH GARG | BITS PILANI | GOA
  • 46. Identity Access through Blockchain 1. Requesting access to ID Blockchain Smart Contract Vendor 2. Notification to allow access to vendor 3. User accepts request & allow access to read User’s Device With App 4. Trust score updated; Transaction saved GLOBAL IDENTITY THROUGH BLOCKCHAIN © RISHABH GARG | BITS PILANI | GOA
  • 47. Functional Mechanism Step 1: Installation of Mobile App  An individual will have to download the mobile app from play store or app store to fetch his identity.  After downloading the app in mobile phones, a user will create a profile on the app.  Once the profile is created, the user will get the unique ID number which will help organizations to send or to get the access to user’s identification documents. GLOBAL IDENTITY THROUGH BLOCKCHAIN © RISHABH GARG | BITS PILANI | GOA
  • 48. Functional Mechanism Step 2: Uploading the documents  On having the unique ID number, the user will fetch the government issued IDs through the app and save them in the IPFS / Private Ledger.  The app will extract the personal information from these ID’s.  The user will now have the ownership of his own data. It would help users to decide what information is to be shared with organizations?  Without the user’s consents, no information can be shared with any identity seekers. GLOBAL IDENTITY THROUGH BLOCKCHAIN © RISHABH GARG | BITS PILANI | GOA
  • 49. Functional Mechanism Issue / Endorsement of Document 1 User would request certificate using Private Key 2 Authority will issue certificate revocation list 3 Nodes will make verification 4 Certificate will be issued thro’ Public Key GLOBAL IDENTITY THROUGH BLOCKCHAIN © RISHABH GARG | BITS PILANI | GOA
  • 50. Functional Mechanism Step 3: Government or Third-party Access  A government organization can send a notification to the user (owning the identity) to make an access to specific details for authentication.  The authority can use the identifiable information only for authentication and the individual will be able to trace the purpose for which his PII has been used.  Blockchain does not store any user’s data except the transactions made between the identity holder and third-party. GLOBAL IDENTITY THROUGH BLOCKCHAIN © RISHABH GARG | BITS PILANI | GOA
  • 51. Functional Mechanism Step 4: Trust Score  Smart contracts can generate a trust score for a user from the information provided by him for creating a self-sovereign identity.  Higher the trust score, higher will be the trustworthiness of an individual.  This can help organizations validate user’s identity on real-time basis.  It can save time, money and provide an insight to user’s credibility. GLOBAL IDENTITY THROUGH BLOCKCHAIN © RISHABH GARG | BITS PILANI | GOA
  • 52. Generation of Trust Score Low Trust Score High Trust Score User Blockchain Trust Score Scale Based on a user’s trust score, user’s integrity can be determined. • Using ID on regular basis. • Validation of details like name, parent’s name, date of birth, phone number etc. match precisely or vary significantly. • Addition of multiple documents - Aadhaar, PAN, Passport, Certificates, Diplomas, Degrees, etc. on the app. • Perfect matches will enhance the trust score. • Not using Global ID actively. • Making frequent changes in identity profile like name, parent’s name, date of birth, gender, religion, etc. . • Fails to upload relevant documents on the system or does not allow access to government organizations to verify identity • Information, from different sources, does not match. GLOBAL IDENTITY THROUGH BLOCKCHAIN © RISHABH GARG | BITS PILANI | GOA
  • 53. User Optimized Features of Blockchain  Each registered user on Blockchain IAM system will get a UID.  UID consists of personal identity information, in encrypted format, stored on his device, backed by IPFS.  User can share his UID with any government organization to authenticate himself through the Blockchain IAM.  Blockchain IAM system does not store any user’s data. It uses Smart Contracts to share the PII, and hence data manipulation is impossible.  No transaction can occur without the explicit consent of the user that adds security to IAM. GLOBAL IDENTITY THROUGH BLOCKCHAIN © RISHABH GARG | BITS PILANI | GOA
  • 54. User Optimized Features …….  Decentralization enables the distribution of information on every node in the network, reducing the chances of SPOF.  Irrespective of geographical boundaries, the users can get their identity verified across the globe.  Blockchain is both cost and time effective.  Blockchain allows every individual on its network to trace the transactions.  Every transaction, recorded on the blockchain, has a verifiable authenticity. However, the identity of the person, involved in transaction, remain obscured. GLOBAL IDENTITY THROUGH BLOCKCHAIN © RISHABH GARG | BITS PILANI | GOA
  • 55. BLOCKCHAIN Applications of Blockchain Health Care Financial Transactions Internet of Things E-commerce Trading Legal Contracts Travel & Transportation Government Services Manufacture Entertainment © RISHABH GARG | BITS PILANI | GOA
  • 56. BLOCKCHAIN Applications of Blockchain in Government Sector Legal Enforcements Legislation Records Bills & Payments Welfare Distribution Taxation Security & Safety Cyber Protection Healthcare Services Digitized IDs Intellectual Property © RISHABH GARG | BITS PILANI | GOA
  • 59. Future State of Citizen Identity Economic Identity Assets Health Land Credit Diaspora Through Mobile App Present State Future State © RISHABH GARG | BITS PILANI | GOA
  • 60. GLOBAL IDENTITY THROUGH BLOCKCHAIN References • Garg, R. Decentralized Applications for Global Networking. Book under peer review process, 2021. • Garg, R. Blockchain based Decentralized Applications for Multiple Administrative Domain Networking. Engineering Research Project, BITS - Pilani, KK Birla Goa Campus IN, 2021: 01-69. • Garg, R. Decentralized Transaction Mechanism based on Smart Contracts (in press) 2021. • Garg, R. Interplanetary File System for Education and e-Verification (in press) 2021. • Garg, R. Ethereum based Smart Contracts for Banking & Finance (in press) 2021. • Garg, R. Self Sovereign Identity using Decentralized Identifiers. Research Oriented Project, 2020: 01-67. • Garg, R. Digital Identity and Access Management through Distributed Ledger Technology. Open Self-Paced Project, 2020. • Garg, R. Multipurpose ID: One Nation - One Identity, Indian Society for Technical Education (ISTE) Annual Convention - National Conference on Recent Advances in Energy, Science & Technology, 2019 (39). • Garg, R. Multipurpose ID: A Digital Identity to 1.34 Billion Indians. Ideate for India - Creative Solutions using Technology. National e-Governance Division, Ministry of Electronics & Information Technology, Government of India, 2018. • Garg, R. Digital ID with Electronic Surveillance System. Innovation registered with National Innovation Foundation - Autonomous Body of Department of Science & Technology, Government of India, 2018. • Garg, R. Hi-Tech ID with Digital Tracking System, National Conference on Application of ICT for Built Environment, 2017. • Garg, R. Generic Information Tracker. 2nd India International Science Festival, New Delhi, 2016. © RISHABH GARG | BITS PILANI | GOA