Table 5 Comparison of Existing work with SSH-DAuth.

From: SSH-DAuth: secret sharing based decentralized OAuth using decentralized identifier

Technology

Soumyashree29

Hadjer B.30

Schiffman32

Kumar37

Padma38

SSH-DAuth

Distributed

\(\checkmark\)

\(\checkmark\)

\(\checkmark\)

\(\checkmark\)

\(\checkmark\)

\(\checkmark\)

msBlockchain

\(\checkmark\)

\(\checkmark\)

\(\checkmark\)

  

\(\checkmark\)

DID

     

\(\checkmark\)

IPFS

     

\(\checkmark\)

Secret sharing

     

\(\checkmark\)