Study of Implementing Blockchain For Enhanced Authentication in Web Portals
Study of Implementing Blockchain For Enhanced Authentication in Web Portals
ISSN NO-2584-2706
Study of Implementing
Blockchain for Enhanced
Authentication in Web Portals
Vidhi Mehta; Shruti Patil; Pranaya Pounikar
Dept of MCA, GHRCEM, Nagpur, RTMNU, India
Abstract 1. Introduction
Authentication is a fundamental component of Web portals are now commonplace for
web security, enabling users to safely access almost every service ranging from e-
online websites. The Authentication is one of commerce and banking to social media and
the major elements of web security that healthcare. Such web portals mandate
facilitates users to secure access to internet secure verifications to confirm users’
websites. Traditional methods of identities and safeguard their personal
authentication are based on password entry, information. Authentication has always
multi-factor authentication (MFA), and single relied on passwords, multi-factor
sign-on (SSO). Even though the methods are authentication (MFA), and Single Sign- On
often followed in these times, the methods are (SSO) systems. Passwords can be stolen
never foolproof Passwords can be hijacked, through phishing or data breaches, MFA
MFA can be circumvented, and SSO depends can be bypassed, and SSO depends on
on centralized infrastructure that can be centralized systems that hackers cantarget.
compromised. Millions of user accounts have Because blockchain offers decentralized
been exposed due to data breaches and and secure identity verification, it's
phishing attacks, and there is a growing authentication methods are much more
demand for a safer alternative. challenging to interfere with and represent
This paper discusses ways blockchain an improvement over the existing
technology improves authentication in web measures. Unlike the traditional methods,
portals. Blockchain provides decentralization, passwords do not need to be stored
immutability, and cryptographic security that centrally using blockchain-based
makes it difficult for hackers to steal authentication, so there is less chance of
credentials or tamper with login systems. We large-scale hacking. With the use of smart
present why decentralized identity (DID), contracts and decentralized identity (DID)
smart contracts, and Web3 authentication are blockchain, users can assert their identity
preferable to conventional alternatives. without any third- party service
Besides, the real-world applications and case interference [1]. This paper focuses on
studies will be examined to demonstrate how the issues surrounding authentication and
blockchain technology can build a more secure how Blockchain technology can help
and user-managed authentication system. This resolve security concerns in web portals. It
paper aims to offer a clear picture of how highlights the important aspects of web
blockchain technology can enhance portals like login systems, decentralized
authentication, minimize hacking threats, and identity, cryptography security, and other
build a safer online environment. postulated functionalities along with their
real-world applications and obstacles in the
Keywords: blockchain, authentication, deployment. It attempts
security, data protection, web portals.
to explore these innovative and secure forms Phishing whereby Hackers will trick users
of identity authentication and their to type in their passwords on sites that are
implementation in web portals. pretending to be sites they trust, Brute-
force attacks Hackers utilize automated
1.1. About Authentication systems to guess at passwords by using
Organizations often face challenges in millions of variations,
managing IT assets efficiently which reduces Database breaches If a database of a
the efficiency of software and it might lead to company is compromised, stored password
issues in the development phase, particularly hashes can be released.
when dealing with large numbers of Most individuals employ the same
workstations spread across multiple teams. password across several websites (e.g.,
Manual tracking methods are difficult to use email, social media, banking). If a single
and prone to inconsistencies, security risks, and website is hacked, attackers can attempt the
resources mismanagement. Moreover, existing same password on other websites.
inventory tools often lack real-time system With every site demanding a password,
updates, seamless Linux integration, and team- users find it difficult to have unique and
based connectivity, making them inadequate complicated passwords. This results in
for modern IT environments. This research using weak password which is easy to
addresses these challenges by developing an crack, noting down passwords which is
automated, real-time workstation inventory susceptible to theft and losing passwords
system that improves monitoring, optimizes and trusting password resets, which can be
resource allocation, and enhances security [3] . taken advantage of by attackers.
separately for each one. This simplifies the to a "block" and broadcast to everyone.
login process for users and reduces the number Each block connects to the last one,
of passwords they need to remember. creating a chain. If an individual
If the Single Sign-On (SSO) provider is hacked, attempts to change a transaction, the
all connected accounts will be vulnerable to group can quickly check the alteration
attacks. since all have a copy of the ledger. This
The security of the entire system relies heavily is to ensure transparency and avoid
on the SSO provider's ability to protect user data fraud.
and prevent breaches. A practical application of blockchain is
When using SSO, individual websites have the use of Bitcoin, a form of
limited control over user data, which can make cryptocurrency that employs the use of
it harder to manage and protect that data. blockchain to track financial
transactions. Each Bitcoin transaction is
deposited in a block, and blocks are
combined to create a public ledger [4]
. The ledger is kept by a worldwide
network of computers (nodes) to prevent
any entity from possessing the data.
system is the target of continuous monitoring in the world, the blockchain technology
and evolution, to combat security flaws or can conveniently enable better user
enhance the behaviour. Blockchain works by authentication in web portals. Unlike
recording transactions in a secure, transparent, traditional methods of passwords and
and immutable manner. If a user starts a two-factor authentication, which can be
transaction it is transmitted to a node network easily hacked, phishing-ed or breached,
with the goal of verification. Confirmed blockchain can eliminate these problems
transactions are aggregated in blocks that with its unique features of
include a list of transactions, a pointer to the decentralization, cryptography and
block prior, and an identity. The network immutability. Here are some of the ways
nodes, based on a consensus mechanism, will which blockchain can enables better user
agree the validity of the block and then will authentication in web services portals.
include that block in the blockchain. After its
introduction, the block is chained to the 2.1.1. Blockchain Technology And
current one, in that it inherits the identity of Strong User Verification Systems
the previous one. Due to the decentralized Blockchains utilize computers which are
structure of the network, the collected data is referred to as nodes and the data is not
not controlled by any one party, and thanks to stored centrally. This means that it can
cryptography, data is tampered evident. This eliminate the need for hackers to target
decentralization, transparency and user credentials stored on a singular
immutability provide blockchain with the server that is prone to attacks. Therefore,
potential for use in secure authentication, Blockchains can enhance cyber security
finance, and supply chain management, etc. by enabling the control of sensitive
Some of the advantages of employing information to only authorized personnel.
blockchain in identity management have For instance, instead of a standard
already been suggested: password, a blockchain system could
Decentralized: The data maintained by the replace it with a set of cryptographic
blockchain has no centralized authority sets. There is a private key that the user
controlling. This means blockchain is only knows and a public key which the
distributed across multiple nodes, meaning no web portal can share. This way whenever
single entity controls the entire network. the user wants to log in into the system,
Tamper Resistant: The data committed to the their identity is verified using these keys
blockchain cannot be removed. Therefore, making the process much more secure
historical actions on the blockchain cannot be and user friendly while eliminating the
modified and all the modifications performed risk of password hacking.
are traceable.
Cost saving: Shared identity data can result in 2.1.2. Methods In Which Blockchain
a cost reduction for relying parties. In addition, Technology Has Helped Reduce Attacks
the size of replicated data in database is Web Portal phishing and other cyber-
minimized. attacks can be efficiently minimized
User control: User never loses control of his with the use of blockchain technology.
digital identity even when he loses access to Here’s how these systems can be secure
any specific service. All the above-mentioned integrated:
points sum up to utilize blockchain network Data Breaches: One of the primary
for authentication. advantages of blockchain technology is the
decentralization of its nature. Information is
2.1. How Blockchain Can spread around a network with multiple nodes,
Improve Authentication therefore in the unreal instance a hacker
With the rapid growth of web service usage manages to break
Vision Towards Emerging Trends in [6] Noh, H., Choi, C., Park, M., Kim, J., & Kim,
Communication and Networking (ViTECoN), S. (n.d.). Security Analysis on Password
2019. Authentication System of Web Portal.
[3] D. Li, W. Deng, W. Peng, and F. Gai, "A Center for Information Security
Blockchain-based Authentication and Security Technologies (CIST), Korea University,
Mechanism for IoT," College of Computer, Seoul, Korea.
National University of Defense Technology, [7] Asif, M., Aziz, Z., Ahmad, M. B., Khalid,
Changsha, Hunan, China. A., Waris, H. A., & Gilani, A. (n.d.).
[4] Ahmed, M. R., Islam, A. K. M. M., Shatabda, S., Blockchain-Based Authentication and Trust
& Islam, S. (n.d.). Blockchain-Based Identity Management Mechanism for Smart Cities.
Management System and Self-Sovereign Identity [8] J. Seo, "The Future of Digital Authentication:
Ecosystem: A Comprehensive Survey. Blockchain-driven Decentralized
Department of Computer Science and Authentication in Web 3.0," Department of
Engineering, United International University, Computer Science and Engineering, Sogang
Dhaka, Bangladesh. University, Seoul, South Korea, 2024.
[5] Ahram, T., Sargolzaei, A., Sargolzaei, S.,
Daniels, J., & Amaba, B. (n.d.). Blockchain
Technology Innovations. Institute for Advanced
Systems Engineering, University of Central
Florida, USA.