{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,10]],"date-time":"2025-12-10T15:59:02Z","timestamp":1765382342943,"version":"build-2065373602"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2021,10,30]],"date-time":"2021-10-30T00:00:00Z","timestamp":1635552000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,10,30]],"date-time":"2021-10-30T00:00:00Z","timestamp":1635552000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2022,4]]},"DOI":"10.1007\/s11277-021-09310-5","type":"journal-article","created":{"date-parts":[[2021,10,30]],"date-time":"2021-10-30T08:03:47Z","timestamp":1635581027000},"page":"3719-3736","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["A Scalable Block Chain Framework for User Identity Management in a Decentralized Network"],"prefix":"10.1007","volume":"123","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4541-3314","authenticated-orcid":false,"given":"R.","family":"Geetha","sequence":"first","affiliation":[]},{"given":"T.","family":"Padmavathy","sequence":"additional","affiliation":[]},{"given":"G.","family":"Umarani Srikanth","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,10,30]]},"reference":[{"key":"9310_CR1","doi-asserted-by":"publisher","first-page":"102731","DOI":"10.1016\/j.jnca.2020.102731","volume":"166","author":"Y Liu","year":"2020","unstructured":"Liu, Y., He, D., Obaidat, M. S., Kumar, N., Khan, M. K., & Choo, K.-K.R. (2020). Blockchain-based identity management systems: A review. Journal of Network and Computer Applications, 166, 102731. https:\/\/doi.org\/10.1016\/j.jnca.2020.102731","journal-title":"Journal of Network and Computer Applications"},{"key":"9310_CR2","doi-asserted-by":"publisher","first-page":"2953","DOI":"10.3390\/app9152953","volume":"9","author":"JA Kassem","year":"2019","unstructured":"Kassem, J. A., Sayeed, S., Gisbert, H. M., Pervez, Z., & Dahal, K. (2019). DNS-IdM: A blockchain identity management system to secure personal data sharing in a network. Applied Science, 9, 2953. https:\/\/doi.org\/10.3390\/app9152953","journal-title":"Applied Science"},{"key":"9310_CR3","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1016\/j.csbj.2018.06.003","volume":"16","author":"WJ Gordon","year":"2018","unstructured":"Gordon, W. J., & Catalini, C. (2018). Blockchain technology for healthcare: Facilitating the transition to patient driven interoperability. Computational and Structural Biotechnology Journal, 16, 224\u2013230. https:\/\/doi.org\/10.1016\/j.csbj.2018.06.003","journal-title":"Computational and Structural Biotechnology Journal"},{"key":"9310_CR4","doi-asserted-by":"publisher","first-page":"1957","DOI":"10.1007\/s11277-019-06503-x","volume":"108","author":"R Geetha","year":"2019","unstructured":"Geetha, R., Madhusudhanan, V., Padmavathy, T., & Lallithasree, A. (2019). A light weight securecommunication scheme for wireless sensor networks. Wireless Personal Communications, 108, 1957\u20131976.","journal-title":"Wireless Personal Communications"},{"key":"9310_CR5","doi-asserted-by":"publisher","first-page":"747","DOI":"10.1007\/s11277-020-07251-z","volume":"113","author":"R Geetha","year":"2020","unstructured":"Geetha, R., Suntheya, A. K., & Srikanth, G. U. (2020). Cloud integrated IoT enabled sensor network security: Research issues and solutions. Wireless Personal Communications, 113, 747\u2013771. https:\/\/doi.org\/10.1007\/s11277-020-07251-z","journal-title":"Wireless Personal Communications"},{"key":"9310_CR6","doi-asserted-by":"publisher","DOI":"10.1007\/s11831-020-09478-2","author":"R Geetha","year":"2020","unstructured":"Geetha, R., & Thilagam, T. (2020). A review on the effectiveness of machine learning and deep learning algorithms for cyber security. Archives of Computational Methods in Engineering. https:\/\/doi.org\/10.1007\/s11831-020-09478-2","journal-title":"Archives of Computational Methods in Engineering"},{"key":"9310_CR7","doi-asserted-by":"publisher","DOI":"10.1109\/ECTICon.2018.8620003","author":"N Chalaemwongwan","year":"2018","unstructured":"Chalaemwongwan, N., & Kurutach, W. (2018). A practical national digital ID framework on the Blockchain. Conference on Electrical Engineering\/Electronics, Computer and Telecommunications Technology. https:\/\/doi.org\/10.1109\/ECTICon.2018.8620003","journal-title":"Conference on Electrical Engineering\/Electronics, Computer and Telecommunications Technology"},{"key":"9310_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2021.03.005","author":"PT SinghRathee","year":"2021","unstructured":"SinghRathee, P. T. (2021). A systematic literature mapping on secure identity management using blockchain technology. Journal of King Saud University - Computer and Information Sciences. https:\/\/doi.org\/10.1016\/j.jksuci.2021.03.005","journal-title":"Journal of King Saud University - Computer and Information Sciences"},{"key":"9310_CR9","doi-asserted-by":"publisher","DOI":"10.1109\/Cybermatics_2018.2018.00253","author":"M Steichen","year":"2018","unstructured":"Steichen, M., Fiz, B., Norvill, R., Shabair, W., & State, R. (2018). Blockchain based \u2013 decentralized access control for IPFS. IEEE Conference on Smart Data, Blockchain, Computer and Information Technology, Congress on Cybermatics. https:\/\/doi.org\/10.1109\/Cybermatics_2018.2018.00253","journal-title":"IEEE Conference on Smart Data, Blockchain, Computer and Information Technology, Congress on Cybermatics"},{"key":"9310_CR10","doi-asserted-by":"publisher","DOI":"10.1109\/Blockchain.2019.00012","author":"E Nyaletey","year":"2019","unstructured":"Nyaletey, E., Parzi, R. M., Zhang, Q., & Choo, K.-K.R. (2019). BlockIPFS\u2013 blockchain-enabled inter planetary file system for forensic and trusted data traceability. IEEE Conference on Blockchain. https:\/\/doi.org\/10.1109\/Blockchain.2019.00012","journal-title":"IEEE Conference on Blockchain"},{"key":"9310_CR11","doi-asserted-by":"publisher","DOI":"10.3390\/app9091788","author":"S Sayeed","year":"2019","unstructured":"Sayeed, S., & Gisbert, H.-M. (2019). Assessing blockchain consensus and security mechanism against the 51% attack. Applied Sciences. https:\/\/doi.org\/10.3390\/app9091788","journal-title":"Applied Sciences"},{"key":"9310_CR12","unstructured":"How to Build an Identity application using the Blockchain. Available: www.deveteam.space\/blog\/how-to-build-an-identification-app-using-blockchain."},{"key":"9310_CR13","unstructured":"Sultan, K., Ruhi, U., & Lakhani, R. (2018). Conceptualizing blockchains: Characteristics and related Applications. In: 11th IADIS International Conference Information Systems."},{"key":"9310_CR14","unstructured":"(2020). Go-Ethereum - Building geth without go overflow. Available: www.geth.ethereum.org\/docs\/install-and-build\/installing-geth."},{"key":"9310_CR15","unstructured":"Toluhi, A. (2018). Land MarketPlaceDapp. Available: www.medium.com\/coinmonks\/Ethereum-land-marketplace-dapp."},{"key":"9310_CR16","unstructured":"Domingo, A. S., & Enriquez, A. M. (2018). Digital identity: The current state of affairs. BBVA Research."},{"key":"9310_CR17","unstructured":"Alpar, G., Hoepman, J. H., & Siljee J. (2011). The identity crisis security, privacy and usability issues in identity management."},{"key":"9310_CR18","unstructured":"Digital Identity on the Threshold of a Digital Identity Revolution. (2018). White Paper by World Economic Forum."},{"issue":"6","key":"9310_CR19","first-page":"93","volume":"2","author":"G Kaur","year":"2013","unstructured":"Kaur, G., & Aggarwal, D. (2013). A survey paper on social sign-on protocol OAuth 2.0. Journal of Engineering, Computer & Applied Sciences, 2(6), 93\u201396.","journal-title":"Journal of Engineering, Computer & Applied Sciences"},{"key":"9310_CR20","first-page":"335","volume":"47","author":"LL Thompson","year":"2007","unstructured":"Thompson, L. L. (2007). Critical issues in identity management-challenges for Homeland Security. JSTOR, 47, 335\u2013356.","journal-title":"JSTOR"},{"key":"9310_CR21","unstructured":"Sovrin, T. M. (2018). A protocol and token for self-sovereign identity and decentralized trust (2018). A White Paper from the Sovrin Foundation."},{"key":"9310_CR22","unstructured":"Sayeed, S., & Gisbert, H. M., (2018). On the effectiveness of blockchain against cryptocurrency attacks. In: Conference on Mobile Ubiquitous Computing System and Technologies, 9781612086767, 9\u201314."},{"key":"9310_CR23","volume-title":"Beyond bitcoin: What Blockchain and distributed ledger technologies mean for firms","author":"A Hughes","year":"2019","unstructured":"Hughes, A., Park, A., Kietzmann, J., & Brown, C. A. (2019). Beyond bitcoin: What Blockchain and distributed ledger technologies mean for firms. Amsterdam: Elsevier."},{"key":"9310_CR24","unstructured":"Zakhari, V., Amiri, M. J., Maiyaa, S., Agarwal, D., & Abaddi A. E. (2019). Towards the global asset management in blockchain systems."},{"key":"9310_CR25","unstructured":"Borrows, M., Harwich, E., Heselwood, L. (2017). The future of public service identity: Blockchain. Reform."}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-021-09310-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-021-09310-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-021-09310-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,7]],"date-time":"2022-04-07T13:25:11Z","timestamp":1649337911000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-021-09310-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,30]]},"references-count":25,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,4]]}},"alternative-id":["9310"],"URL":"https:\/\/doi.org\/10.1007\/s11277-021-09310-5","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"type":"print","value":"0929-6212"},{"type":"electronic","value":"1572-834X"}],"subject":[],"published":{"date-parts":[[2021,10,30]]},"assertion":[{"value":"20 October 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 October 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors that they have declare that no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}