Abstract

Self-sovereign identity is the next evolution of identity management models. This survey takes a journey through the origin of identity, defining digital identity and progressive iterations of digital identity models leading up to self-sovereign identity. It then states the relevant research initiatives, platforms, projects, and regulatory frameworks, as well as the building blocks including decentralized identifiers, verifiable credentials, distributed ledger, and various privacy engineering protocols. Finally, the survey provides an overview of the key challenges and research opportunities around self-sovereign identity.

Highlights

  • Existing identity management models are not future proof. e existing digital identity management models which rely on centralized data repositories and identity providers have led to a growing number of data breaches, causing significant loss of personal data and tremendous cost to all stakeholders and in particular the users. e proliferation of digital services has placed digital identity in the center stage

  • We provide a description of identity and access management (IAM) architecture and its key operations, and a detailed explanation of existing identity management models leading up to self-sovereign identity

  • We begin this section by describing the key building blocks of Self-sovereign identity (SSI), including decentralized identifiers, verifiable credentials and decentralized public key infrastructure (DPKI), blockchain, and verifiable data registry, along with technologies such as identity hubs and agents which help realize the architectural requirements of SSI

Read more

Summary

Introduction

Existing identity management models are not future proof. e existing digital identity management models which rely on centralized data repositories and identity providers have led to a growing number of data breaches, causing significant loss of personal data and tremendous cost to all stakeholders and in particular the users. e proliferation of digital services has placed digital identity in the center stage. In jurisdiction with inadequate privacy laws and protection, data repositories are subject to government’s arbitrary access to identity data and extrajudicial surveillance without the prior consent of the user. Is article provides a comprehensive survey of the research landscape for self-sovereign identity and delivers an overarching overview of the technologies, standards, industry initiatives, and academic work related to this rapidly evolving topic. To this end, the article starts by offering the definition of the digital identity and access management system, iterating through various IAM models leading up to the SSI model.

Challenges of Current Digital Identity Management Models
Identity and Access Management
Architecture of Self-Sovereign Identity Model
Privacy Engineering
Regulations
Conclusion and Future Research
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call