Skip to main content
. 2021 May 12;7:e516. doi: 10.7717/peerj-cs.516

Table 2. A contrast of authentication schemes.

Ser. Parameter Existing schemes Proposed scheme
1 Confidentiality Simple data transfer Encrypted data transfer
2 Availability Existing authentication schemes does not confirm availability Our system provide higher fault tolerance in terms of availability by denying illegal requests
3 Immutability Existing authentication schemes do not provide integration with blockchains Proposed authentication scheme provides integration with blockchains
4 Traceability Existing authentication schemes have no traceability mechanism using immutable data structures i.e., blockchains Proposed scheme store traceable data in blockchaines to provide immutability
5 Speed Data transmission occure at the network speed A very negligible transmission delay may occure while storing data in the blockchain
6 Transparency/visibility Peers and other members have to visibility on the authentication system Peers have access on the blockchain streams to view data and allow and validate authentication
7 Mutual Authentication No practice of mutual authentication Mutual authentication is carried out using two men rule