Abstract
Self-sovereign identity is the next evolution of identity management models. This survey takes a journey through the origin of identity, defining digital identity and progressive iterations of digital identity models leading up to self-sovereign identity. It then states the relevant research initiatives, platforms, projects, and regulatory frameworks, as well as the building blocks including decentralized identifiers, verifiable credentials, distributed ledger, and various privacy engineering protocols. Finally, the survey provides an overview of the key challenges and research opportunities around self-sovereign identity.
Highlights
Existing identity management models are not future proof. e existing digital identity management models which rely on centralized data repositories and identity providers have led to a growing number of data breaches, causing significant loss of personal data and tremendous cost to all stakeholders and in particular the users. e proliferation of digital services has placed digital identity in the center stage
We provide a description of identity and access management (IAM) architecture and its key operations, and a detailed explanation of existing identity management models leading up to self-sovereign identity
We begin this section by describing the key building blocks of Self-sovereign identity (SSI), including decentralized identifiers, verifiable credentials and decentralized public key infrastructure (DPKI), blockchain, and verifiable data registry, along with technologies such as identity hubs and agents which help realize the architectural requirements of SSI
Summary
Existing identity management models are not future proof. e existing digital identity management models which rely on centralized data repositories and identity providers have led to a growing number of data breaches, causing significant loss of personal data and tremendous cost to all stakeholders and in particular the users. e proliferation of digital services has placed digital identity in the center stage. In jurisdiction with inadequate privacy laws and protection, data repositories are subject to government’s arbitrary access to identity data and extrajudicial surveillance without the prior consent of the user. Is article provides a comprehensive survey of the research landscape for self-sovereign identity and delivers an overarching overview of the technologies, standards, industry initiatives, and academic work related to this rapidly evolving topic. To this end, the article starts by offering the definition of the digital identity and access management system, iterating through various IAM models leading up to the SSI model.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have