Please use this identifier to cite or link to this item:
https://ir.iimcal.ac.in:8443/jspui/handle/123456789/4076
Title: | Digital Identity: Application of blockchain in public data |
Authors: | Sengupta, Aritra Saha, Deepanjan |
Keywords: | Cyber attack Maharashtra Electricity Grid Critical Infrastructure (CI) Computer Emergency Response Team (CERT-In) Ransomware attack Malware Hack Cryptography Estonia |
Issue Date: | 2022 |
Publisher: | Students of PGDBA Post Graduate Diploma in Business Analytics, IIM Calcutta |
Series/Report no.: | Vol.3; |
Abstract: | India is the largest democracy in the world with the second largest population (Source: World Bank Data, 2022). When it comes to governance, organized digital demographic data is one of the essential components of the modern era of data-driven technologies. Even though the government has initiated several steps to digitalize data, recent incidents of COVID had pointed out the necessity of further robust measures. For example, data related to migratory workers during lockdown, the number of citizens who needed social relief, and data on daily infection and death counts were unorganized initially. In our day-to-day life, we have to bear the nuisance of carrying multiple id-cards for various functionalities. For example PAN for financial identity, Aadhaar card for personal identity, driving license, PPO book for pension holders, health insurance card, and so on. Due to the multitude of information points for a single citizen, it is operationally challenging for the government to monitor or track all those points (the idcards). At the same time, it is difficult for citizens to maintain such a long list of id-proofs. Another challenge is data manipulation. Since the different governing bodies work separately, there is no in-place real-time data transfer mechanism among them. As a result, manipulating the personal data in any of these identity documents is an easy task. Several instances of duplicate id-card, fake id-cards, id-card of non-existent persons, etc. emerge frequently. This is a real threat to national security as data manipulation makes it difficult to identify unauthorized citizens. So can we aggregate all such fragmented data sources from where all necessary information will be embedded and can be retrieved easily? Is there any benefit to that? Is there any potential risk associated? Is it even a feasible idea to implement? |
URI: | https://ir.iimcal.ac.in:8443/jspui/handle/123456789/4076 |
Appears in Collections: | AINA 3.0 - Volume 3 Edition 2021-22 |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Digital Identity Applications of blockchain in public data.pdf | Digital Identity Applications of blockchain in public data | 376.06 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.