Autors: Liveretos, A. D., Lazarova, M. K.
Title: Decentralized Identity and Verifiable Credentials-Trends and Advancement
Keywords: decentralized identity, digital identity, verifiable credentials

Abstract: This paper explores the transformative potential of decentralized identity and verifiable credentials for digital identity management. It also emphasizes the need for digital identities, as a trusted abstraction model, to connect entities and manage their relationships. The decentralized identity is a trusted connector between data and services, enabling users to control their data and complete transactions. Verifiable credentials allow data issuers to issue cryptographically signed information to data holders, who can present it to data verifiers for independent validation. This model ensures better compliance with privacy regulations and improves security. This paper highlights the importance of neutrality, controllability, and interoperability in the ecosystem, with identity wallets playing a crucial role in managing identifiers and verifiable credentials.

References

  1. O. Dib, O., and B. Rababah, "Decentralized identity systems: Architecture, challenges, solutions and future directions, " Annals of Emerging Technologies in Computing (AETiC), 4(5), 2020, pp. 19-40.
  2. M. Shaik, "Rethinking federated identity management: A blockchainenabled framework for enhanced security, interoperability, and user sovereignty, " Blockchain Technology and Distributed Systems, vol. 2, no. 1, pp. 21-45.
  3. Mazzocca, C., Acar, A., Uluagac, S., Montanari, R., Bellavista, P., & Conti, M. (2024). "A Survey on Decentralized Identifiers and Verifiable Credentials". arXiv preprint arXiv:2402.02455.
  4. A. Bazarhanova, and K. Smolander, "The review of non-Technical assumptions in digital identity architectures", Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020, pp. 6408-6417.
  5. L. Xiao, B. Hu, M. Croitoru, P. Lewis, and S. Dasmahapatra, "A knowledgeable security model for distributed health information systems, " Computers & Security, vol. 29, no. 3, 2010, pp. 331-349.
  6. C. Mazzocca, A. Acar, S. Uluagac, R. Montanari, P. Bellavista, and M. Conti, "A survey on decentralized identifiers and verifiable credentials, " arXiv preprint arXiv:2402.02455, 2024.
  7. M. Alizadeh, K. Andersson, and O. Schelén, "Comparative analysis of decentralized identity approaches, " IEEE Access, vol. 10, 2022, pp. 92273-92283.
  8. Brunner, C., Gallersdörfer, U., Knirsch, F., Engel, D., & Matthes, F. (2020, December). Did and vc: Untangling decentralized identifiers and verifiable credentials for the web of trust. In Proceedings of the 2020 3rd International Conference on Blockchain Technology and Applications (pp. 61-66).
  9. Pamela Dingle, Decentralized Identity: Verifiable Credentials Deep Dive, 2022, https://techcommunity.microsoft.com/t5/securitycompliance-And-identity/decentralized-identity-verifiable-credentialsdeep-dive/ba-p/3690641
  10. G. Jacucci, P. Daee, T. Vuong, S. Andolina, K. Klouche, M. Sjöberg, T. Ruotsalo, and S. Kaski, "Entity recommendation for everyday digital tasks, " ACM Transactions on Computer-Human Interaction (TOCHI), vol. 28, no. 5, 2021, pp. 1-41.
  11. S. Pagano, "Digital identity: The international landscape of active systems", 2021.
  12. Regulation (EU) 2024/1183 of the European Parliament and of the Council of 11 April 2024 amending Regulation (EU) No 910/2014 as regards establishing the European Digital Identity Framework, https://eur-lex.europa.eu/eli/reg/2024/1183/oj
  13. Korir, M., Parkin, S., & Dunphy, P. (2022). An empirical study of a decentralized identity wallet: Usability, security, and perspectives on user control. In Eighteenth symposium on usable privacy and security (SOUPS 2022) (pp. 195-211).
  14. Z. Ansaroudi, R. Carbone, G. Sciarretta, and S. Ranise, "Control is nothing without trust a first look into digital identity wallet trends, " in V. Atluri, A. Ferrara, Eds., Data and Applications Security and Privacy XXXVII. DBSec, Lecture Notes in Computer Science, vol. 13942. Springer, Cham, 2023, pp. 113-132.
  15. K. Chadwick, J. Vercammen, "Openid for verifiable credentials", OpenID Foundation, 2022.
  16. Mulaji, S. M. (2023). Technological, organisational, and environmental factors affecting the adoption of blockchain-based distributed identity management in organisations. https://core.ac.uk/download/574566892.pdf
  17. Rot A. and Blaicke B., Blockchain's future role in cybersecurity. analysis of defensive and offensive potential leveraging blockchainbased platforms, Proceedings of the 2019 9th International Conference on Advanced Computer Information Technologies (ACIT), June 2019, Ceske Budejovice, Czech Republic, IEEE, 447-451.

Issue

National Conference with International Participation, TELECOM, 2024, , https://doi.org/10.1109/TELECOM63374.2024.10812293

Вид: публикация в международен форум, публикация в реферирано издание, индексирана в Scopus