Towards an Efficient Scheme for User Authentication based on Decentralized Blockchain

##plugins.themes.academic_pro.article.main##

Narayani Singh
Rahul Patekar
Gaurav Kedia
Neha Tirpude

Abstract

Peer-to-peer network principles are the foundation of Blockchain Cybersecurity. Blockchain creates a reliable verification method that protects against online dangers. Cryptocurrency on the Blockchain is supported by three pillars: network availability, secrecy, and integrity. A third route toward stronger security, one that is less traveled and not nearly as inviting to attackers, is provided by Blockchain. This method lessens risks, offers robust encryption, and more successfully confirms the ownership and integrity of data. Some passwords frequently referred to as the weakest link in Cybersecurity, may even be unnecessary without them. So we aim to build a secure user authentication system using blockchain and also learn about how SCADA systems work in healthcare.

##plugins.themes.academic_pro.article.details##

Author Biographies

Narayani Singh, Shri Ramdeobaba College of Engineering and Management, Nagpur

Ms.Narayani Prabhakar Singh is a B.Tech Student at Shri Ramdeobaba College of Engineering and Management. She is studying Computer Science Engineering specializing in Cyber Security. She has a wide range of knowledge of Cyber Security.She has EC-council, (ISC)² and CISCO certifications in Ethical Hacking, Penetration Testing, and Digital Forensics.Also, various certifications like - Risk management and Blockchain.She worked as a virtual Research and Cyber intern at SAP- Forage (USA).She is currently working as a management intern with CodeF solution Nagpur a startup company. She holds excellent communication and management skills also awarded by Shri. Anand Kumar (Super30) and Deputy Chief Minister of Maharastra-Shri.Devendra Fadnavis for her outstanding performance in public speaking. She was selected among 22,000 participants in RISE ThriveDx Hackathon in the top 200. She has also participated in various tech vents- Google Cloud 30-day camp, and Android development with Kotlin. Her academic article on Cyber Security was also published on Google sites.Her interest lies in Cyber Security, Risk management and Digital Forensics.

Rahul Patekar, Shri Ramdeobaba College of Engineering and Management, Nagpur

Mr. Rahul Anil Patekar is a B.Tech Student at Shri Ramdeobaba College of Engineering and Management. He is studying Computer Science Engineering specializing in Cyber Security. He was in the top 100 finalists among 22,000 participants in Rise Hackathon powered by ThrixeDX. He has a wide range of knowledge in the Essentials of Ethical hacking, operating systems, computer networking, and cryptography. He has various certifications in AWS and Blockchain. He has an interest in python and Kali Linux. He has participated in many different events like Google Cloud 30 Day Program, Android Development in Kotlin and Django workshop for URL shortener. He exhibits excellent management, communication, and teamwork skills. He 2-star coder on the Codechef platform. He is also interested in competitive programming. His areas of interest are Kali Linux, Penetration testing, and vulnerability assessment.

Neha Tirpude, Shri Ramdeobaba College of Engineering and Management, Nagpur

Ms. Neha Tirpude is an Assistant Professor in the Department of Computer Science and Engineering (Cyber Security) at Shri Ramdeobaba College of Engineering and Management, Nagpur, with demonstrated history in under-graduate engineering higher education facility with active participation in extra-curricular event management, with 7+ years of teaching experience. She is currently pursuing Ph.D. in Computer Science and Engineering from Indian Institute of Information Technology, Nagpur and her domain of research is Image Processing. She received the degree of Bachelor of Engineering and Master of Technology in Computer Science and Engineering from RTMNU Nagpur University. She has published research papers in reputed International Journals. Her academic area of interest includes Information Security, UI/UX design, Software Engineering.

How to Cite
Singh, N., Rahul Patekar, Kedia, G., & Tirpude, N. (2023). Towards an Efficient Scheme for User Authentication based on Decentralized Blockchain. International Journal of Next-Generation Computing, 14(1). https://doi.org/10.47164/ijngc.v14i1.1021

References

  1. Balcerzak, Adam P., e. a. 2020. ”blockchain technology and smart contracts in decentralized governance systems”. Administrative Sciences 12.3. 96. DOI: https://doi.org/10.3390/admsci12030096
  2. Bambara, J. J. and Allen, P. R. 2018. ”blockchain”. In A practical guide to developing business, law and technology solutions. New York City: McGraw-Hill Professional.
  3. Farell, R. 2015. An analysis of the cryptocurrency industry.
  4. Guo, Shaoyong, e. a. 2019. ”blockchain meets edge computing: A distributed and trusted authentication system.”. IEEE Transactions on Industrial Informatics Vol.16.3, 1972-1983. DOI: https://doi.org/10.1109/TII.2019.2938001
  5. Hamidi, Eki Ahmad Zaki, M. R. E. and Shiddiq, H. A. 2018. ”design and implementation supervisory control and data acquisition (scada) of sedimentation process of water treatment plant (wtp) by using raspberry pi 3 b”. IEEE. DOI: https://doi.org/10.1109/ICWT.2018.8527736
  6. John, Kose, M. O. and Saleh, F. 2021. ”bitcoin and beyond.”.
  7. Sharma, M., Singh, J., Gupta, A., Tanwar, S., Sharma, G. and Davidson, I.E., 2021. Intercloud Resource Discovery Using Blockchain. IEEE Access, 9, pp.161224-161247. DOI: https://doi.org/10.1109/ACCESS.2021.3131515
  8. Li, Xiaoqi, e. a. 2020. ”a survey on the security of blockchain systems.”. Future Generation Computer Systems Vol.107, No.841-18. DOI: https://doi.org/10.1016/j.future.2017.08.020
  9. Lim, Shu Yun, e. a. 2020. ”authchain: A decentralized blockchain-based authentication system.”. Int. J.Eng. Trends Technol No.70-74. DOI: https://doi.org/10.14445/22315381/CATI1P212
  10. Mohanta, Bhabendu K., e. a. 2019. ”decauth: Decentralized authentication scheme for iot device using ethereum blockchain.”. IEEE. DOI: https://doi.org/10.1109/TENCON.2019.8929720
  11. Monteith, Scott, e. a. 2021. ”increasing cybercrime since the pandemic: Concerns for psychiatry”. Current psychiatry reports Vol.23.4, No.1-9. DOI: https://doi.org/10.1007/s11920-021-01228-w
  12. Noel, Steven, e. a. 2010. ”measuring security risk of networks using attack graphs.”. International Journal of Next-Generation Computing 113-123.
  13. Normann, Mathias, e. a. 2020. ”security systems in the healthcare sector”. 166. DOI: https://doi.org/10.1561/9781680836875.ch9
  14. Upadhyay, D. and Sampalli., S. 2020. ”scada (supervisory control and data acquisition) systems: Vulnerability assessment and security recommendations.”. 101666. DOI: https://doi.org/10.1016/j.cose.2019.101666
  15. Yuan, Liang, e. a. 2021. ”coopedge: A decentralized blockchain-based platform for cooperative edge computing.”. Proceedings of the Web Conference 2021. DOI: https://doi.org/10.1145/3442381.3449994
  16. Zhuang, Peng, T. Z. and Liang, H. 2020. ”blockchain for cybersecurity in smart grid: A comprehensive survey”. IEEE Transactions on Industrial Informatics Vol.17.1, 3-19. DOI: https://doi.org/10.1109/TII.2020.2998479
  17. Ozt ¨ urk, Tolgahan, e. a. ¨ 2022. ”machine learning-based intrusion detection for scada systems in healthcare”. Network Modeling Analysis in Health Informatics and Bioinformatics Vol.11.1, 1-10 DOI: https://doi.org/10.1007/s13721-022-00390-2