Abstract
Identity management is a fundamental component in securing online services. Isolated and centralized identity models have been applied within organizations. Moreover, identity federations connect digital identities across trust domain boundaries. These traditional models have been thoroughly studied with regard to trust requirements. The recently emerging blockchain technology enables a novel decentralized identity management model that targets user-centricity and eliminates the identity provider as a trusted third party. The result is a substantially different set of entities with mutual trust requirements. In this paper, we analyze decentralized identity management based on blockchain through defining topology patterns. These patterns depict schematically the decentralized setting and its main actors. We study trust requirements for the devised patterns and, finally, compare the result to traditional models. Our contribution enables a clear view of differences in trust requirements within the various models.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Williamson, G., Yip, D., Sharoni, I., Spaulding, K.: Identity Management: A Primer. MC Press Online, LP (2009)
Nakamoto, S.: Bitcoin: A Peer-to-Peer Electronic Cash System (2008). https://bitcoin.org/bitcoin.pdf. Accessed 18 Jan 2019
Wood, G.: Ethereum: a secure decentralised generalised transaction ledger. https://pdfs.semanticscholar.org/ac15/ea808ef3b17ad754f91d3a00fedc8f 96b929.pdf. Accessed 18 Jan 2019
Meinel, C., Gayvoronskaya, T., Schnjakin, M.: Blockchain: hype oder innovation. Hasso-Plattner Institute, Prof.-Dr.-Helmert-Straße 2-3, 14482 Potsdam, Germany (2018)
Jøsang, A., Fabre, J., Hay, B., Dalziel, J., Pope, S.L.: Trust requirements in identity management. In: Proceedings of the 2005 Australasian Workshop on Grid Computing and e-Research. ACSW Frontiers 2005, Darlinghurst, Australia, vol. 44, pp. 99–108. Australian Computer Society, Inc., (2005). http://dl.acm.org/citation.cfm?id=1082290.1082305
Kylau, U., Thomas, Y., Menzel, M., Meinel, C.: Trust requirements in identity federation topologies. In: 2009 International Conference on Advanced Information Networking and Applications, pp. 137–145, May 2009
Ferdous, M.S., Poet, R.: Analysing attribute aggregation models in federated identity management. In: Proceedings of the 6th International Conference on Security of Information and Networks. SIN 2013, pp. 181–188. ACM (2013)
Jøsang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decis. Support Syst. 43(2), 618–644 (2007)
Castelfranchi, C., Falcone, R.: Trust Theory: A Socio-Cognitive and Computational Model, 1st edn. Wiley, Hoboken (2010)
McKnight, D.H., Chervany, N.L.: The meanings of trust. University of Minnesota, Technical report (1996)
Satariano, A.: What the G.D.P.R., Europe’s tough new data law, means for you (2018). https://www.nytimes.com/2018/05/06/technology/gdpr-european-privacy-law.html. Accessed 18 Jan 2019
Grüner, A., Mühle, A., Gayvoronskaya, T., Meinel, C.: A quantifiable trust model for blockchain-based identity management. In: 2018 International Conference on Blockchain, August 2018
Blockchain and identity (2018). https://github.com/peacekeeper/blockchain-identity. Accessed 18 Jan 2019
Lundkvist, C., Heck, R., Torstensson, J., Mitton, Z., Sena, M.: uPort: a platform for self-sovereign identity (2016). http://blockchainlab.com/pdf/uPort_whitepaper_DRAFT20161020.pdf. Accessed 18 Jan 2019
Reed, D., Law, J., Hardman, D.: The Technical Foundations of Sovrin. A white paper from the Sovrin foundation (2016). https://www.evernym.com/wp-content/uploads/2017/07/The-Technical-Foundations-of-Sovrin.pdf. Accessed 18 Jan 2019
Sporny, M., Longley, D.: W3C community group draft report. Verifiable claims data model and representations 1.0 (2018). https://www.w3.org/2017/05/vc-data-model/CGFR/2017-05-01/. Accessed 18 Jan 2019
Allen, C.: The path to self-sovereign identity (2016). http://www.lifewithalacrity.com/2016/04/the-path-to-self-soverereign-identity.html/cointelegraph.com/news/first-iteration-of-ethereum-metropolis-hard-fork-to-appear-monday. Accessed 18 Jan 2019
Windley, P.: Digital Identity. O’Reilly Media Inc., Newton (2005)
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Grüner, A., Mühle, A., Gayvoronskaya, T., Meinel, C. (2020). A Comparative Analysis of Trust Requirements in Decentralized Identity Management. In: Barolli, L., Takizawa, M., Xhafa, F., Enokido, T. (eds) Advanced Information Networking and Applications. AINA 2019. Advances in Intelligent Systems and Computing, vol 926. Springer, Cham. https://doi.org/10.1007/978-3-030-15032-7_18
Download citation
DOI: https://doi.org/10.1007/978-3-030-15032-7_18
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-15031-0
Online ISBN: 978-3-030-15032-7
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)