Is Self-Sovereign Identity Really Sovereign?

被引:1
作者
Naik, Nitin [1 ]
Jenkins, Paul [2 ]
机构
[1] Aston Univ, Sch Informat & Digital Engn, Birmingham, W Midlands, England
[2] Cardiff Metropolitan Univ, Cardiff Sch Technol, Cardiff, Wales
来源
2022 IEEE INTERNATIONAL SYMPOSIUM ON SYSTEMS ENGINEERING (ISSE) | 2022年
关键词
Self-Sovereign Identity; SSI; Identity Management System; IDM; Decentralized IDentifier; DID; Verifiable Credential; VC; Distributed Ledger Technology; Blockchain; DLT;
D O I
10.1109/ISSE54508.2022.10005404
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Digital identity is the backbone of the digital world, and self-sovereign identity (SSI) is an identity model aimed at providing sovereign digital identity based on certain principles of sovereignty. This SSI model offers sole ownership of the digital identity to the identity owner and control over how their personal data is shared and used. It is a very promising and powerful identity model with respect to previous identity models; however, it is equally important to understand the meaning of sovereignty in digital identity in the SSI model. Therefore, this paper examines the sovereignty of digital identity in the SSI model in order to understand the meaning, type and level of sovereignty of digital identity in the SSI model. Initially, it explains the meaning of sovereignty in different contexts such as in the real world, cyberspace and digital identity. Subsequently, it critically analyses the sovereignty of digital identity from two perspectives, the sovereignty of digital identity in the identity network, and the sovereignty of an identity owner and identity network in the state where they operate, in order to understand the meaning, type and level of sovereignty of digital identity in the SSI model. Finally, this paper highlights the main rights and constraints of sovereign identity in the SSI model in order to further elucidate the meaning of sovereign identity.
引用
收藏
页数:7
相关论文
共 19 条
  • [1] [Anonymous], 2020, 2020 8 IEEE INT C MO
  • [2] [Anonymous], 2020, 2020 IEEE INT S SYST
  • [3] Box J, 2019, ENGAGING EUROPEAN DI
  • [4] Hughes A., 2020, PRIMER DECENTRALIZED
  • [5] Kurian T, 2020, ENGAGING EUROPEAN DI
  • [6] Lalancette C, 2021, IMPORTANCE DIGITAL I
  • [7] Moyihan H., 2019, The application of international law to state cyberattacks: Sovereignty and non-intervention
  • [8] Naik N., 2020, 7 INT C BEHAVIOURAL
  • [9] Naik N., 2021, 2021 IEEE INT S SYST
  • [10] An evaluation of potential attack surfaces based on attack tree modelling and risk matrix applied to self-sovereign identity
    Naik, Nitin
    Grace, Paul
    Jenkins, Paul
    Naik, Kshirasagar
    Song, Jingping
    [J]. COMPUTERS & SECURITY, 2022, 120