Abstract
Recent technological shifts have pressured businesses to reshape the way they operate and transact. At the hart of this restructuring, identity management established itself as an essential building block in both B2C and B2B business models. Trustworthy identities may refer to customers, businesses, suppliers or assets, and enable trusted communications between different actors. Unfortunately, traditional identity management systems rely on centralized architectures and trust in third party services. With the inception of blockchain technology, new methods for managing identity emerged, which promise better decentralization and self-sovereignty. This paper provides an evaluation of a selection of distributed identity methods, and analyzes their properties based on the categorization specified in the W3C recommendation rubric.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
This work expands upon a technical report that evaluates DID method specifications [4] which was conducted by the authors.
- 2.
- 3.
- 4.
- 5.
- 6.
- 7.
- 8.
- 9.
Cf. https://veres.one/.
- 10.
References
Aublin, P.L., Mokhtar, S.B., Quéma, V.: RBFT: redundant byzantine fault tolerance. In: 2013 IEEE 33rd International Conference on Distributed Computing Systems, pp. 297–306. IEEE (2013)
Bartoletti, M., Pompianu, L.: An analysis of bitcoin op\(\_\)return metadata. In: International Conference on Financial Cryptography and Data Security, pp. 218–230 (2017)
Deuber, D., Magri, B., Thyagarajan, S.A.K.: Redactable blockchain in the permissionless setting. In: 2019 IEEE Symposium on Security and Privacy (SP), pp. 124–138. IEEE (2019)
Fdhila, W., Stifter, N., Kostal, K., Saglam, C., Sabadello, M.: DID methods evaluation report - draft, January 2021. https://docs.google.com/document/d/1jP-76ul0FZ3H8dChqT2hMtlzvL6B3famQbseZQ0AGS8/
Klein, H.: ICANN and internet governance: leveraging technical coordination to realize global public policy. Inf. Soc. 18(3), 193–207 (2002)
Lesavre, L., Varin, P., Mell, P., Davidson, M., Shook, J.: A taxonomic approach to understanding emerging blockchain identity management systems. CoRR abs/1807.06346 (2019)
Luu, L., Chu, D.H., Olickel, H., Saxena, P., Hobor, A.: Making smart contracts smarter. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 254–269 (2016)
Mühle, A., Grüner, A., Gayvoronskaya, T., Meinel, C.: A survey on essential components of a self-sovereign identity. CoRR abs/1807.06346 (2018)
Naik, N., Jenkins, P.: uPort open-source identity management system: An assessment of self-sovereign identity and user-centric data platform built on blockchain. In: 2020 IEEE International Symposium on Systems Engineering, pp. 1–7 (2020)
Reed, D., Law, J., Hardman, D.: The technical foundations of Sovrin. Technical report, Sovrin, 2016 (2016)
Stifter, N., Judmayer, A., Weippl, E.: Revisiting practical byzantine fault tolerance through blockchain technologies. In: Security and Quality in Cyber-Physical Systems Engineering, pp. 471–495. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-25312-7_17
Acknowledgments
This research is based upon work partially supported by (1) the Christian-Doppler-Laboratory for Security and Quality Improvement in the Production System Lifecycle; The financial support by the Austrian Federal Ministry for Digital and Economic Affairs, the Nation Foundation for Research, Technology and Development and University of Vienna, Faculty of Computer Science, Security & Privacy Group is gratefully acknowledged; (2) SBA Research (SBA-K1); SBA Research is a COMET Center within the COMET – Competence Centers for Excellent Technologies Programme and funded by BMK, BMDW, and the federal state of Vienna. The COMET Programme is managed by FFG. (3) the FFG ICT of the Future project 874019 dIdentity & dApps. (4) the FFG Industrial PhD project 878835 SmartDLP. (5) the U.S Department of Homeland Security Science and Technology Directorate’s Silicon Valley Innovation Program (SVIP) under OTA 70RSAT20T00000030. Any opinions contained herein are those of the author(s) and do not necessarily reflect those of DHS S&T
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Fdhila, W., Stifter, N., Kostal, K., Saglam, C., Sabadello, M. (2021). Methods for Decentralized Identities: Evaluation and Insights. In: González EnrÃquez, J., Debois, S., Fettke, P., Plebani, P., van de Weerd, I., Weber, I. (eds) Business Process Management: Blockchain and Robotic Process Automation Forum. BPM 2021. Lecture Notes in Business Information Processing, vol 428. Springer, Cham. https://doi.org/10.1007/978-3-030-85867-4_9
Download citation
DOI: https://doi.org/10.1007/978-3-030-85867-4_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-85866-7
Online ISBN: 978-3-030-85867-4
eBook Packages: Computer ScienceComputer Science (R0)