Keywords

1 Introduction

Identity management (IDM) refers to the mechanism and standards for creation, maintenance, and de-provisioning of user accounts. It covers the administrative area that identifies and authenticates users and controlling the user’s access to resources such as applications, systems, or online services. Identity management has evolved from centralized identity, where user credentials are owned and managed by a single entity, to federated identity that provides authentication and authorization capabilities across organizational and system boundaries.

In centralized identity system, users struggle to maintain different sets of credentials for different services. They lose control of their personal data when the information is duplicated across different providers. When federated identity is adopted, a privacy invasion issue arises because users are subject to profiling and analytics when their data resides with providers [1]. Identity providers, on the other hand, are facing constant security attacks on their centralized databases; therefore, high costs are incurred to build multifactor authentication and secure their perimeter network. Identity providers can also be held liable for data breaches under existing data protection acts [2]. The security, privacy, and usability challenges faced by both users and providers are expected to be resolved with the introduction of self-sovereign identity management (SSIDM) [3].

Self-sovereign identity is the concept that users should be able to control their own digital identity [4, 5]. Individual users or organizations can store their own identity data on their own devices and provide their identity to a verifier without relying on a central repository of identity data. Since this is independent from any individual silo, it gives the user full control, security, and full portability of their data [6]. Blockchain technology can be used to deliver this secure solution without the need for a trusted, central authority. It can be used for creating an identity on the blockchain, giving them greater control over who has their personal information and the way the information is being accessed [7].

One of the pioneers in blockchain-based SSIDM, Sovrin Foundation, describes self-sovereign identity as an Internet for identity where no one owns it, everyone can use it, and anyone can improve it [8]. By removing the need for a trusted third party, blockchain enables the creation of decentralized identity management without a central identity provider. In the light of this, decentralized IDM based on blockchain has different trust requirements compared to traditional IDM. There are various roles and objects that replace the centralized trusted third party; hence, trust must be managed in a dynamic and granular manner [7].

A SSIDM trust model should be able to assign a trust rating or trust score to every stakeholder based on observations from past transactions. The National Institute of Standards and Technology (NIST) presented in its cybersecurity white paper [9] a comprehensive list of entities and their roles in identity management. The stakeholders defined are requester, issuer, subjects and holders, verifier, and relying party. Every role in this ecosystem is involved in requesting credential, issuing credential, disclosing presentation, verifying presentation, and credential revocation (Fig. 1).

Fig. 1
figure 1

Identity management roles defined by the NIST [9]

When a trust model is implemented on blockchain, a smart contract can be used for transparent, efficient, and secure calculation of trust rating. Automation using a smart contract should incur minimal overhead in terms of latency and throughput.

Trust is a pervasive and significant phenomenon in social societies with a diverse and manifold range of meanings and definitions [10]. Trust is also a fundamental for cooperation, conversation, and mutual interaction between entities. In recent decades, trust has been studied in many different disciplines and used as the basis for decision-making in different contexts [11].

Trust modeling uses the methodology of mathematics to obtain peers’ trust intention and reliability information based on the definition of trust [12]. The trust engine, on the other hand, leverages multiple data sources to compute a risk score or credit score [13]. In mobile gaming, trust modeling is used to determine the authenticity of players’ geo-position [14]. In wireless communication, trust refers to the relationship value computed based on the rate of successful transactions between network nodes [15]. There is much research on trust modeling, and most of them are in areas such as Internet of things, cybersecurity, social network, online services, and cloud computing, to name but a few [16,17,18,19,20,21].

However, these solutions are not suitable when applied to Self-Sovereign IDM. With the introduction of blockchain-based Self-sovereign IDM, a different approach is needed for the computation of trust in digital identities. Self-sovereign IDM calls for specific requirements of trust not just for digital identities but also for claims and attestations made by entities. Existing blockchain-based IDM solutions can be further improved to determine the trustworthiness of claims and digital identities [22].

Many existing trust models use a static, preconfigured trust relationship to interact, such as the web of trust approach with pre-defined trust anchors in the Sovrin project [8]. The trust anchors’ trustworthiness is assumed, rather than derived. However, trust can change dynamically according to actions and behaviors of entities [23].

Therefore, a distributed and dynamic approach for managing trust among identity management roles in Blockchain-based Self-sovereign IDM is needed. There are many parameters that could be considered for the trustworthiness of identities, claims, and attestations. A richer set of trust clues or parameters will lead to less fraud in identity transactions and management.

We provide a survey of trust model in blockchain-based SSIDM with the methodology shown in Fig. 2. First of all, the NIST blockchain identity management system architecture is adopted and referenced for the baseline terms and definition. Next, a taxonomy of trust approaches and trust models were examined. In the third phase, related works were investigated with a focus on their trust model. Finally, we use input from the previous phases to derive the open issue and the future directions of trust modeling for blockchain-based SSIDM.

Fig. 2
figure 2

Research methodology

The paper starts by introducing the evolution of online identities and the concept of blockchain-based self-sovereign identity. In Sect. 2, the components of blockchain-based SSIDM are described. The components include verifiable credentials, verifiable presentations, digital wallet, decentralized identifiers, the underlying Blockchain network, and the Trust infrastructure of SSIDM. Section 3 presents a taxonomy of trust approaches and trust models. A summary of related SSIDM projects and respective trust models are presented in Sect. 4. The paper closes with research directions in Sect. 5 and a conclusion.

2 Architecture of Blockchain-Based SSIDM

Blockchain-based SSIDM consists of several components at different layers of the architecture. All identity data such as claims, verifiable credentials, and verifiable presentations are held in a digital wallet by an identity holder. The digital wallet is identified by a public key, facilitated by decentralized identity (DID) layer. A smart contract runs on top of the blockchain to implement the business logic. Beneath all components is the distributed ledger, a shared and tamper-proof record of transactions. The ledger on different nodes forms the heart of a blockchain system that empowers this self-sovereign identity ecosystem. The building blocks are discussed in detail in the following subsections.

  1. A.

    Stakeholders

The technical paper presented by the NIST [9] provides an overview of stakeholders that interact in a blockchain-based SSIDM. Subjects or holders request for the issuance of a credential. The issuer issues a credential to subjects or holders based on the request. The credential can later be presented to a verifier. The verifier will verify the presentation to a Relying Party. These roles are not exclusive because both subject and issuer can play the role of requester and a subject and verifier can both be a Relying Party (Fig. 3).

Fig. 3
figure 3

Stakeholders of blockchain-based SSIDM

  1. B.

    Claim

A claim is an identifier, or a statement made about an entity. An entity in this case can be a distinct person, organization, or device. For example, “Mary Ann is a holder of a bachelor’s degree in IT” is described as a subject-property-value relationship in Fig. 4 [24].

Fig. 4
figure 4

Subject-property-value relationship [24]

The verifiable claims have a specific data model that can be expressed in data representation languages such as JSON (Fig. 5), JSON-LD, WebIDL, and XML [24].

Fig. 5
figure 5

Example of verifiable claim in JSON

  1. C.

    Verifiable Credential

On the other hand, credential is more formal than a claim. It can be a set of one or more claims made by an entity. Verifiable credentials (Fig. 6) are digital certifications such as academic degree (Fig. 7), proof of employment (Fig. 8), and proof of income (Fig. 9). Every stakeholder could issue, hold, or verify credentials.

Fig. 6
figure 6

Verifiable credential [25]

Fig. 7
figure 7

Credential graph showing credential metadata and proof graph for credential presentation. University A is the issuer of credential as a degree awarding institution. This is a proof of academic qualification

Fig. 8
figure 8

Credential graph showing credential metadata and proof graph for credential presentation. University A is the issuer of the credential as an employer. This is a proof of employment

Fig. 9
figure 9

University A, a potential employer for John Doe, is the verifier of a credential issued by pension fund to determine annual remuneration of John Doe. This is a proof of income level.

A verifiable credential may contain at least one or a set of claims in the form of metadata that describes the properties of the credential, such as a credential identifier, a public key of the issuer, or a timestamp. These metadata may be signed by the issuer. The issuer will attach a cryptographical signature such as an RSA signature, a nonce, a signature value, a creation timestamp, and an issuer’s public key. These parameters are required for a third party to verify a credential.

  1. D.

    Verifiable Presentation

Verifiable presentations are created out of claims and verifiable credentials. They serve to present personal identity information in a trusted way to third parties, revealing only as much information as required, to preserve the identity owner’s privacy. Presentation is based on one or multiple credentials. The relationship between a claim, credential, and presentation is depicted in Fig. 10.

Fig. 10
figure 10

Relationship between verifiable claim, verifiable credential, and verifiable presentation [26]

  1. E.

    Digital Wallet

A subject or holder stores credentials in a personal device and software such as digital wallet, as in the real world where people keep their IDs in their physical wallet [27, 28]. A digital wallet serves as an agent in SSIDM ecosystem [7]. The wallet is used to perform authentication and prove ownership using the public and private key pairs generated. Since credentials are issued off-chain, the wallet contains all the self-attested information and credentials regarding the identity owner. The credential can be presented to a third party for authentication or authorization to use a service. A holder could present entire credentials, parts of them, or combinations of multiple credentials in the form of proofs to verifiers. Thus, the holder has full control over which data is shared and how it is used.

  1. F.

    Decentralized Identity

The decentralized identity (DID) layer allows an entity to be publicly identified in SSIDM solutions. DID methods allow users to request or issue verifiable credentials by providing the operations to create, read, update, and delete credentials in a decentralized way without the need of a central authority. There are emerging standards for recording credential metadata such as decentralized identifiers (DIDs) from W3C [26], DID Auth from the Rebooting the Web-of-Trust (RWOT) working group [29], Universal Resolver and Identity Hubs from the Decentralized Identity Foundation (DIF) [30], and Open Badges from Mozilla and IMS Global [31]. A DID standard will decide what credential metadata is recorded on the distributed ledger. Instead of storing credential metadata directly into the ledger, an identifier is used because the underlying blockchain is immutable.

  1. G.

    Smart Contract

A smart contract [32] defines the interactions between transacting parties and implements logic agreed by all nodes in a blockchain network. It is sometimes referred to as chaincode, but a smart contract is in fact defined within a chaincode. Multiple smart contracts for related business processes can be deployed in the same chaincode.

A smart contract comprises trigger conditions and response rules. Input to the smart contract can be time, event, transaction, action, etc. It performs evaluation of contract clauses and auto-executes contract statements once triggered. Upon completion, the output based on conditions and response rules will be written on a new block (Fig. 11).

Fig. 11
figure 11

Structure of smart contract and chaincode [32]

  1. H.

    Blockchain and Distributed Ledger Technology (DLT)

Blockchain is one of the main pillars of SSIDM, alongside verifiable credentials, verifiable presentations, decentralized identifiers, and smart contract. Underneath smart contract is the blockchain network and distributed ledger where the immutable and transparent records reside. The characteristics of blockchain make it a good fit for creating an advanced identity management ecosystem in a decentralized manner which satisfies the principles of self-sovereign identity (Fig. 12).

Fig. 12
figure 12

Architecture of blockchain DLT [33]

The consensus layer is critical for any blockchain network. Consensus ensures that all nodes in blockchain agree to the truth. For a blockchain with cryptocurrency like Ethereum, consensus also rewards the nodes for validating the transactions and maintaining the blockchain network. Proof of work (PoW), proof of stake (PoS), and Practical Byzantine Fault Tolerance (pBFT) are excellent consensus algorithms for nodes to agree on the records on blocks. Hyperledger Fabric, Indy, and Iroha implemented voting-based consensus. For instance, Hyperledger Fabric uses RAFT algorithm for the log replication process [34]. Once a leader is elected, all messages are sent via the leader. The leader will propagate the messages to all nodes, and the nodes then validate and write the messages. The nodes will also send a response to inform the leader that the message has been validated and written. Hyperledger Indy uses plenum [35] algorithm, which is an improved version of Redundant Byzantine Fault Tolerance. The consensus algorithm uses three-phase commit on the request to ensure that the ledger contains entries that are ordered and validated.

Network layer is used for information dissemination between participating peers [36]. Data layer consists of Merkle tree, a binary tree of hashes to offer integrity and non-repudiation for blockchain. Transactions are digitally signed in data layer using asymmetric cryptography.

Infrastructure layer is where all peer nodes reside. Organization uses certificate authority to assign X.509 digital certificates to all participating nodes recognized by the blockchain network. The nodes with virtualization using virtual machines or containers can support messaging services and storage of data [37].

Many blockchain networks have been developed for identity management. Notable works on identity management have been primarily conducted on the Hyperledger blockchain. Hyperledger Indy [38] is specifically created for self-sovereign identity management. This blockchain provides tools, libraries, and reusable components for providing digital identities rooted on blockchains or other distributed ledgers so that they are interoperable with other blockchains. Indy provides built-in support for zero-knowledge proofs to avoid unwanted disclosure of identity attributes. When a verifiable claim is not considered true, zero-knowledge proofs enable identity owners to authenticate the possession of a credential without displaying the credential itself with the help of anonymous credential scheme [39].

Hyperledger Aries [40] is a spin-off of Hyperledger Indy, to realize interoperable self-sovereign identity which covers more on the client side components such as wallet services and agent protocols. The blockchain focuses on providing tools and features to create, transmit, and store verifiable credentials in a wallet. This project utilizes cryptographic libraries and key management schemes provided by Hyperledger Ursa [41].

Another project under the Hyperledger project umbrella is Hyperledger Fabric [42, 43] which supports digital assets, distributed logic through chaincode, and the use of custom consensus through endorsement policies. Initially Fabric still lacked a key component for a decentralized identity, but TrustID was later incorporated in Hyperledger Fabric to simplify identity management in blockchain networks.

The trust framework is not shown in the architecture (Fig. 13) because trust can be implemented at all layers. The blockchain DLT serves as a root of trust in the architecture. Trust can also come from the decentralized identity layer and is managed depending on adopted DID standard. Verifiable credentials and verifiable presentations can have their own trust features implemented at a higher layer.

Fig. 13
figure 13

Building blocks for blockchain-based self-sovereign identity management

3 Types of Trust Model in Identity Management

One of the most cited definitions of trust is by Mayer et al. [44] “the willingness of a party to be vulnerable to the actions of another party based on the expectation that the other will perform a particular action important to the trustor, irrespective of the ability to monitor or control that other party.” Trust is determined by the trustor’s propensity to trust, ability, benevolence, and integrity of the trustee in their proposed model of trust.

Propensity to trust is the willingness to trust others across a broad spectrum of situations and trust targets. This suggests that every individual has some baseline level of trust that will influence that willingness to trust. Ability is also referred to as the competence of the trustee to do a given task. Benevolence is the disposition of goodwill toward the trusting party. And lastly, integrity is the trustor’s perception that the trustee adheres to a set of principles that are acceptable to the trustors.

The goal of trust is to determine what course of action, if any, the trusting party is willing to take in relation to the trusted party. Based on the level of trust and the perceived risk, the trusting party may decide to take some action that involves some degree of risk taking. Trust level has a corresponding risk rating; a lower risk translates to higher level of trust.

Trust models are classified based on how they are controlled [20] as shown in Table 1. The NIST [25] defined the two main approaches as top-down and bottom-up, with the latter frequently associated with SSIDM principles. Top-down approaches to trust lead to centralization of information, control, and loss of individual privacy. The bottom-up approach to trust is taken to avoid these pitfalls.

Table 1 Type of trust models based on flow of control

These two approaches form a spectrum of trust models, i.e., centralized, decentralized, and distributed models which can support different types of governance structures and power delegation mechanisms. In a centralized system, trust level is exerted by just one entity (i.e., trust anchor, CA, board of trustees). In a decentralized system, there is no single controlling entity, and every entity makes their own decision on trust level. In distributed approach, the trust level is shared among entities, and trust computation is distributed across nodes. Nodes interact with each other to determine trust level.

A trust model can also be categorized based on control of transactions (Table 2). The static model follows pre-defined rules, but the dynamic model adjusts with different parameters and progress based on the previous cached data stored in a data store.

Table 2 Types of trust models based on control of transaction

The types of trust approach are categorized as reputation-based trust, policy-based trust, and evidence-based trust [20]. In reputation-based trust, the reputation of an entity is the collected estimation of the public’s trust toward that entity. Generally, many entities in a community trust an entity that has a high reputation; an entity, which is required to build trust decision on a trustee, uses the reputation to compute or approximate the trust level of the trustee [45]. However, Forrester Research [46] introduced the concept of a zero-trust model which states that no trust should be assumed but instead trust should be continually validated. This concept has been adopted widely in the design and implementation of IT systems.

In policy-based trust, formal trust methodologies are used to support key certification, digital signature, and validation. For instance, in PKI model, a certificate authority (CA) supports data attribute certification and validation. Certificate policies play a main role in PKI trust which has been introduced since the introduction of PGP [47]. In evidence-based trust, performance of entities from previous transactions determines the trust level. Trust level is deduced from past behavior in terms of accuracy and honesty [48].

A summary of the trust approaches is presented in Table 3 with respective advantages and disadvantages.

Table 3 Types of trust approach

4 Related Works on Blockchain-Based SSIDM Trust Models

This new approach to manage identity has many opportunities going forward. Initiatives to research and explore the possibilities of this technology come from individuals and companies as well as governments. There are several trust models that have been introduced by various researchers and organizations incorporating their best parameters and efficiency. Limitation and summary of related works are exhibited in Tables 4 and 5.

  1. A.

    Sovrin

Table 4 Limitation of existing trust models
Table 5 Summary of blockchain-based SSIDM and trust models

Sovrin [8] is a private, global, nonprofit foundation to govern self-sovereign identity network. It is the first of its kind trust framework for advocating self-sovereign identity. The foundation believes in portable identity which allows general users to perform verification and authentication of identity, while preserving personal information. The foundation proposed the idea of having identity claim, credentials to replace the use of physical documents. Identity data includes social security number, name, address, education, employment data, etc.

The Sovrin protocol is built on public permissioned blockchain using open standards and the open-source Hyperledger Indy project. All Sovrin identifiers and public keys are pseudonymous by default. Sovrin uses pairwise-pseudonymous identifiers, a separate decentralized identity (DID) for every relationship.

Sovrin network comprises an identity network and a trust network. The trust network executes a proprietary trust framework (Fig. 14). Identity owners can use their Sovrin identities to establish a basic level of trust [49]. Trustees and trust anchors play a role in building the Sovrin web of trust. The web of trust mechanism is not the most efficient because every new node in the network will add to the existing long chain. This makes it very costly to maintain the trust chain, and a mesh of cross-certifying nodes does not scale well [50].

Fig. 14
figure 14

Sovrin trust assurance framework

Sovrin’s board of trustees are also required to accredit stewards which later apply the trust assurance framework. Stewards also assert compliance to other verifiers and relying parties. All transactions will be reviewed for compliance by the auditor.

Another problem with the Sovrin web of trust is the use of delegated trust similar to PGP 5.0. This concept involves the delegation of trust from a pre-defined trust anchor. Delegated trust is hierarchical and centralized, hence inheriting all problems of a centralized trust model.

  1. B.

    uPort

uPort [51] aims to be an open self-sovereign identity system that operates on the Ethereum blockchain. uPort enables users to handle their identity and credential in a secure manner like every other SSI project. It provides portability of identity and credential data to other blockchain network such as Bitcoin. uPort utilizes two protocols, namely, the identity and claim protocols. The Identity Protocol is an address on a decentralized network, controlled by a private signing key, and makes use of a decentralized public key infrastructure (PKI) that enables signature validation. On the other hand, the claim protocol refers to a standard message format that enables source attribution and facilitates interoperability between various blockchain and identity networks. The claim protocol supports the JSON Web Token (JWT) and Ethereum transactions. Among products and tools offered by uPort is the self-sovereign wallet. Being unmanaged and fully self-sovereign, there is no entity identity proofing of user accounts in uPort [52].

uPort also offers uPort Serto, a product suite for organizations to set up identity ecosystems. The Serto product suite includes a mobile wallet, a credential management platform, a privacy preserving graph data, and a credential discovery platform. uPort Serto took the approach of mapping verifiable credentials and decentralized identifiers (DIDs) into existing ecosystems based on local law, international agreements, and even internal business rules which gives them the advantage of fulfilling data compliance such as General Data Protection Regulation (GDPR).

uPort itself is a trust management platform; therefore, the trust control is static and archaic. Enterprises can assign trust rating for digital identities using the tools that come with the product suite.

  1. C.

    Evernym

Evernym [53] is another blockchain-based SSIDM built on Hyperledger Indy [38]. This project introduces a concept called “Trust over IP” (ToIP). This is an architecture that can establish trust between peers over the network. This solution ensures interoperability with Hyperledger Aries [40] and open standards such as W3C DIDs [26] and W3C verifiable credentials [24]. Like uPort, Evernym operates as a trust management platform with a verifiable credential trust triangle between issuer, holder, and verifier. The trust control is also static, using policy- and reputation-based approaches.

  1. D.

    Jolocom

Jolocom [54] is an open-source project to provide sets of protocols for building a dynamic self-sovereign identity ecosystem. The entire stacks are based on open standards such as W3C DIDs and verifiable credentials. Jolocom also provides a smart wallet for users to create and manage identities in a visual and user-friendly manner. These sets of protocols are compatible with any public permissioned, public permissionless, or private blockchain network. The project aims to realize a truly decentralized and modern digital identity management. Jolocom is playing the role of trust management platform; therefore, trust control is static. There is no mechanism to compute trust in a decentralized manner based on the exchange of verifiable claims for associated identities in the ecosystem.

  1. E.

    Quantifiable Trust Model

Grüner et al. [55] analyzed decentralized IDM trust requirements based on blockchain. Their paper presented a comparison study of trust requirements for traditional IDM and decentralized IDM through defining topology patterns. The topology pattern reflects the relevant entities and their interaction paths. Trust requirements for isolated, centralized, federated, and decentralized IDM were formally defined, compared, and presented. The authors concluded that the benefit of decentralized trust model is reduced reliance of trust toward the identity and attribute providers.

The authors also proposed the concept that replaces trust with a central identity provider by aggregated trust into attestation issuers [56]. The calculated numerical trust metric serves as an independent basis for the definition of assurance level to simplify and automate reasoning about trust by service providers without requiring a dedicated evaluation of a trusted third party. However, the security assumption of the trust model is based on preconfigured trust of identities.

  1. F.

    WiP

Bendiab et al. presented a blockchain-based decentralized model [57] to provide authentication and trust computation. This trust model does not require entities’ preconfigured trust relationships, but trustworthiness is computed based on their behavior over time. The behavior data can be captured from the transactions stored in the blockchain. The authors proposed a much-desired dynamic trust control. Nevertheless, the proposed credibility value is a preset range which lacks test and experiments to ensure its accuracy and usability in the environment.

  1. G.

    SCPKI

Al-Bassam et al. proposed a smart contract-based PKI (SCPKI) [58], an alternative PKI approach that uses smart contracts to build a decentralized web of trust adopted from the Pretty Good Privacy (PGP) [47] system. It addresses the issue of rogue certificates issued by certificate authorities in traditional public key infrastructures. The smart contract allows users to add, sign, and revoke attributes. This gradually builds a web of trust where users vouch for each other’s identity attributes, but it does not provide the trustworthiness of verifiable claims. Due to the implementation of smart contracts on the Ethereum platform, charges are incurred for identity transactions as a result of the cost of paying the blockchain miners to process a transaction. Lastly, actions may be delayed by transaction processing time.

  1. H.

    Centralized Trust Registry

Baars et al. [59] claim that reliability of an identity is only as good as the authority issuing that identity so a system should not be dependent on a trusted third party. Although there are many cases where community-based reputation systems (distributed reputation-based approach) can be useful, most business transactions are required to trace back a chain of responsibility in case things go wrong. The system should also allow acquirers to determine the validity of a claim. The project proposed a decentralized exchange of data but a centralized issuance of trustworthiness by having a trust registry. This way the SSIDM is independent from the systems of the issuer and allows availability of claims even when the issuer itself stops its services.

5 Research Directions

Existing trust models in SSIDM still very much rely on the web of trust, as well as governance and trust frameworks in a centralized manner. There is a need for research in this area to improve trust models of a decentralized nature. More use cases and prototypes are also needed to evaluate their accuracy and usability.

A trust engine automates the computation of trustworthiness of digital identities and verifiable credentials. In recent years, machine learning and deep learning have proven to be remarkably good at solving complex problems such as computer vision, big data, and natural language processing. Machine learning also plays an important role in establishing and measuring trustworthiness [60]. By investigating useful features that are capable of distinguishing successful transactions from unsuccessful ones, sophisticated machine learning algorithms can be applied to analyze past transactions. If these algorithms manage to model efficiently what a successful or unsuccessful transaction is, they can be used to predict the trustworthiness of a potential transaction [61].

Trustworthiness of SSIDM stakeholders can be facilitated by computational trust models, and the accuracy of trust rating can be effectively improved. There are a variety of attributes and multitudes of characteristics to support the computation of trustworthiness in SSIDM, for instance, the transaction history in account provisioning, revocation, and recovery; the number of verifiable claim exchange, claims, or counterclaims issued; and the number of correct or incorrect attested claims.

These are data that are globally readable on the ledger. The immutable data on the blockchain can be trusted by all stakeholders. Therefore, instead of having a centralized certificate authority, the data on ledger can provide a richer set of parameters that could be explored to determine trust rating in a dynamic manner.

Additionally, trust and reputation from other layers such as DIDs and digital wallet in the ecosystem can be considered. Trust rating from blockchain and DLT consensus and peer-to-peer communication layer can also be incorporated to achieve a comprehensive trust framework (Fig. 15).

Fig. 15
figure 15

Trust framework for blockchain-based SSIDM

The SSIDM architecture presented in Sect. 2 is still constantly evolving; therefore, it is difficult to ensure the interoperability of trust model with different ledgers. There is a challenge to ensure that the trust framework comprising of trust model and trust engine is working as desired in a variety of SSIDM platforms.

6 Conclusion

In this paper, we presented a comprehensive review of the architecture, components, trust management, and approaches for blockchain-based SSIDM. Despite blockchain being an effective technology for self-sovereign identity management, it does not comprise an effective trust framework. As with any other IDM solutions, blockchain-based SSIDM requires a unique model to ensure trustworthiness of entities in the ecosystem.

Every trust management approach in the literature has its own strengths and weaknesses. Existing solutions are lacking in certain ways especially the trust computation in digital identities and verifiable claims. We believe, with the introduction of a dynamic computation of trustworthiness, this open issue can be addressed and subsequently can break the adoption barrier of blockchain-based SSIDM.