1 |
Confidentiality |
Simple data transfer |
Encrypted data transfer |
2 |
Availability |
Existing authentication schemes does not confirm availability |
Our system provide higher fault tolerance in terms of availability by denying illegal requests |
3 |
Immutability |
Existing authentication schemes do not provide integration with blockchains |
Proposed authentication scheme provides integration with blockchains |
4 |
Traceability |
Existing authentication schemes have no traceability mechanism using immutable data structures i.e., blockchains |
Proposed scheme store traceable data in blockchaines to provide immutability |
5 |
Speed |
Data transmission occure at the network speed |
A very negligible transmission delay may occure while storing data in the blockchain |
6 |
Transparency/visibility |
Peers and other members have to visibility on the authentication system |
Peers have access on the blockchain streams to view data and allow and validate authentication |
7 |
Mutual Authentication |
No practice of mutual authentication |
Mutual authentication is carried out using two men rule |