skip to main content
10.1145/3463677.3463705acmotherconferencesArticle/Chapter ViewAbstractPublication Pagesdg-oConference Proceedingsconference-collections
research-article

With blockchain or not? Opportunities and challenges of self-sovereign identity implementation in public administration: Lessons from the Belgian case

Published:09 June 2021Publication History

ABSTRACT

Self-sovereign identity (SS) has become a trend within the digital identity circles. This new paradigm places a user in the centre and allows them to have more control over their identity information. Such a concept has swiftly found its enthusiasts, who also actively experiment on SSI implementation in the public sector. Although SSI does not imply having any technology at the backbone, it is usually discussed in the blockchain context. This article explores what opportunities this new identity concept can bring to the public sector and the associated challenges in this process. Also, we seek to examine the dependency of SSI on blockchain technology. For this, we study the existing knowledge on SSI from the literature and interview industry experts to elucidate this phenomenon. Using the thematic analysis technique, we propose a framework for assessing the opportunities and challenges, using the case of Belgium as an example, showcasing the potential of SSI and what barriers it still needs to overcome. We conclude that although blockchain does contribute to achieving SSI, it is not the silver bullet for it.

References

  1. C. Allen, “The Path to Self-Sovereign Identity,” Life With Alacrity, 2016. http://www.lifewithalacrity.com/2016/04/the-path-to-self-soverereign-identity.html (accessed Nov. 10, 2019).Google ScholarGoogle Scholar
  2. G. Hileman and M. Rauchs, “2017 Global Blockchain Benchmarking Study,” SSRN Electronic Journal, Apr. 2018, doi: 10.2139/ssrn.3040224.Google ScholarGoogle Scholar
  3. T. Lyons, L. Courcelas, and K. Timsit, “Blockchain and digital identity ,” May 2019.Google ScholarGoogle Scholar
  4. S. Ølnes and A. Jansen, Blockchain technology as infrastructure in public sector: an analytical framework. 2018. doi: 10.1145/3209281.3209293.Google ScholarGoogle Scholar
  5. A. Mühle, A. Grüner, T. Gayvoronskaya, and C. Meinel, “A survey on essential components of a self-sovereign identity,” Computer Science Review, vol. 30. Elsevier Ireland Ltd, pp. 80–86, Nov. 01, 2018. doi: 10.1016/j.cosrev.2018.10.002.Google ScholarGoogle ScholarCross RefCross Ref
  6. M. S. Ferdous, F. Chowdhury, and M. O. Alassafi, “In Search of Self-Sovereign Identity Leveraging Blockchain Technology,” IEEE Access, vol. 7, pp. 103059–103079, Jul. 2019, doi: 10.1109/access.2019.2931173.Google ScholarGoogle ScholarCross RefCross Ref
  7. A. Tobin and D. Reed, “The Inevitable Rise of Self-Sovereign Identity A white paper from the Sovrin Foundation,” 2017.Google ScholarGoogle Scholar
  8. Q. Stokkink and J. Pouwelse, “Deployment of a Blockchain-Based Self-Sovereign Identity,” in 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), 2018, pp. 1336–1342. doi: 10.1109/Cybermatics_2018.2018.00230.Google ScholarGoogle Scholar
  9. K. C. Toth and A. Anderson-Priddy, “Self-Sovereign Digital Identity: A Paradigm Shift for Identity,” IEEE Security and Privacy, vol. 17, no. 3, pp. 17–27, May 2019, doi: 10.1109/MSEC.2018.2888782.Google ScholarGoogle ScholarCross RefCross Ref
  10. P. Dunphy and F. A. P. Petitcolas, “A first look at identity management schemes on the blockchain,” IEEE Security and Privacy, vol. 16, no. 4, pp. 20–29, Jul. 2018, doi: 10.1109/MSP.2018.3111247.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. D. van Bokkem, R. Hageman, G. Koning, L. Nguyen, and N. Zarin, “Self-Sovereign Identity Solutions: The Necessity of Blockchain Technology,” Apr. 2019, Accessed: Apr. 09, 2020. [Online]. Available: http://arxiv.org/abs/1904.12816Google ScholarGoogle Scholar
  12. D. S. Baars, “Towards self-sovereign identity using blockchain technology.” Oct. 2016. [Online]. Available: http://essay.utwente.nl/71274/Google ScholarGoogle Scholar
  13. M. van Wingerde, “BLOCKCHAIN-ENABLED SELF-SOVEREIGN IDENTITY An exploratory study into the concept Self-Sovereign Identity and how blockchain technology can serve the fundamental basis” Tilburg, 2017. doi: 10.13140/RG.2.2.17693.82406.Google ScholarGoogle Scholar
  14. F. Wang and P. de Filippi, “Self-Sovereign Identity in a Globalized World: Credentials-Based Identity Systems as a Driver for Economic Inclusion  ,” Frontiers in Blockchain, vol. 2. p. 28, 2020. [Online]. Available: https://www.frontiersin.org/article/10.3389/fbloc.2019.00028Google ScholarGoogle ScholarCross RefCross Ref
  15. A. Preukschat and D. Reed, Self-Sovereign Identity: Decentralized Digital Identity and Verifiable Credentials, Manuscript. Manning publications, 2019. [Online]. Available: https://www.manning.com/books/self-sovereign-identityGoogle ScholarGoogle Scholar
  16. [16] K. Wagner, B. Némethi, E. Renieris, P. Lang, E. Holst, and B. Eric, “Self-sovereign Identity: A position paper on blockchain enabled identity and the road ahead,” 2018.Google ScholarGoogle Scholar
  17. W3C, “Decentralized Identifiers (DIDs) v1.0,” Apr. 21, 2020. https://w3c.github.io/did-core/ (accessed Apr. 27, 2020).Google ScholarGoogle Scholar
  18. G. Kondova and J. Erbguth, Self-Sovereign Identity on Public Blockchains and the GDPR. 2020. doi: 10.1145/3341105.3374066.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. G. Zyskind, O. Nathan, and A. ’. Pentland, “Decentralizing Privacy: Using Blockchain to Protect Personal Data,” in 2015 IEEE Security and Privacy Workshops, 2015, pp. 180–184. doi: 10.1109/SPW.2015.27.Google ScholarGoogle ScholarCross RefCross Ref
  20. M. Iansiti and K. R. Lakhani, “The Truth About Blockchain,” Harvard Business Review , no. January-February, pp. 118–127, 2017, Accessed: Feb. 25, 2020. [Online]. Available: https://hbr.org/2017/01/the-truth-about-blockchainGoogle ScholarGoogle Scholar
  21. Thales, “National ID cards in Belgium (2020 update) | Thales,” Thales Group, 2020. https://www.thalesgroup.com/en/markets/digital-identity-and-security/government/customer-cases/belgium (accessed May 30, 2020).Google ScholarGoogle Scholar
  22. European Commission, “2019 European and Regional Innovation Scoreboards,” 2019. https://ec.europa.eu/commission/presscorner/detail/en/ip_19_2991 (accessed Oct. 28, 2019).Google ScholarGoogle Scholar
  23. OECD, OECD Economic Surveys: Belgium 2020. OECD, 2020. doi: 10.1787/1327040c-en.Google ScholarGoogle Scholar
  24. Belnet, “Belnet and Smals team up in building infrastructure for European blockchain project | Belnet corporate,” Belnet, Feb. 24, 2020. https://belnet.be/en/news-events/publications/press-review/belnet-and-smals-team-building-infrastructure-european (accessed May 31, 2020).Google ScholarGoogle Scholar
  25. European Commission, “Digital Government Factsheets - Belgium,” 2019.Google ScholarGoogle Scholar
  26. Deloitte, “The smartphone takes the crown,” 2018. https://mobile-consumer-survey.deloitte.be/2018_the-smartphone-takes-the-crown (accessed May 12, 2020).Google ScholarGoogle Scholar
  27. FPS Justice, “Wet 2004-09-01/33,” FPS Justice, 2004. http://www.ejustice.just.fgov.be/cgi_loi/loi_a1.pl?language=fr&caller=list&cn=2003032532&la=f&fromtab=loi&sql=dt=%27arrete royal%27&tri=dd+as+rank&rech=1&numero=1Google ScholarGoogle Scholar
  28. FPS Home Affairs, “IBZ in brief,” 2017.Google ScholarGoogle Scholar
  29. BOSA, “Development · Fedict/eid-mw Wiki · GitHub,” GitHub.com, 2017. https://github.com/Fedict/eid-mw/wiki/Development (accessed May 30, 2020).Google ScholarGoogle Scholar
  30. itsme®, “Partners | itsme®.” https://www.itsme.be/en/partners (accessed Apr. 06, 2020).Google ScholarGoogle Scholar
  31. Gemalto, “itsme® – the last word in Digital ID for Belgian citizens,” 2019.Google ScholarGoogle Scholar
  32. FPS Justice, “WET 2017-10-22/11,” FPS Justice, 2017. http://www.ejustice.just.fgov.be/cgi_loi/change_lg.pl?language=nl&la=N&table_name=wet&cn=2017102211Google ScholarGoogle Scholar
  33. DG Digital Transformation, “Authentic sources DG Digital Transformation,” DG Digital Transformation (in Dutch). https://dt.bosa.be/nl/authentieke_bronnen (accessed May 31, 2020).Google ScholarGoogle Scholar
  34. CSAM, “What is CSAM? - CSAM.be.” https://www.csam.be/en/about-csam.html (accessed Feb. 28, 2020).Google ScholarGoogle Scholar
  35. IAA, “Identity & Access Management (IAM),” 2019.Google ScholarGoogle Scholar
  36. R. K. Yin, Case study research and applications: design and methods, 6th ed., vol. 6. Los Angeles, 2018.Google ScholarGoogle Scholar
  37. G. Wolfond, “A Blockchain Ecosystem for Digital Identity: Improving Service Delivery in Canada's Public and Private Sectors,” Technology Innovation Management Review October 2017 (Volume 7, Issue 10), vol. 7, no. 10, 2017.Google ScholarGoogle Scholar
  38. A. Abraham, “Whitepaper about the Concept of Self-Sovereign Identity including its Potential,” 2017. Accessed: Apr. 25, 2020. [Online]. Available: www.egiz.gv.atGoogle ScholarGoogle Scholar
  39. J. E. Setsaas, “2019’s identity buzzword- Self Sovereign Identity (SSI)- and my concerns with it,” Jan. 01, 2020. https://www.signicat.com/resources/2019s-identity-buzzword-self-sovereign-identity-ssi-and-my-concerns-with-it (accessed Apr. 29, 2020).Google ScholarGoogle Scholar
  40. A. Satybaldy, M. Nowostawski, and J. Ellingsen, “Self-Sovereign Identity Systems: Evaluation Framework,” 2020, pp. 447–461. doi: 10.1007/978-3-030-42504-3_28.Google ScholarGoogle Scholar
  41. P. C. Bartolomeu, E. Vieira, S. M. Hosseini, and J. Ferreira, “Self-Sovereign Identity: Use-cases, Technologies, and Challenges for Industrial IoT,” in IEEE International Conference on Emerging Technologies and Factory Automation, ETFA, Sep. 2019, vol. 2019-September, pp. 1173–1180. doi: 10.1109/ETFA.2019.8869262.Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. U. Der, S. Jähnichen, and J. Sürmeli, “Self-sovereign Identity – Opportunities and Challenges for the Digital Revolution,” 2017.Google ScholarGoogle Scholar
  43. [43] W. van Dongen, “The potential of blockchain technology for the public sector,” Leuven: KU Leuven. Faculteit Economie en Bedrijfswetenschappen, 2019.Google ScholarGoogle Scholar
  44. M. Saunders, P. Lewis, and A. Thornhill, “Research Methods for Business Students,” Jan. 2009.Google ScholarGoogle Scholar
  45. P. Baxter and S. Jack, “The Qualitative Report Qualitative Case Study Methodology: Study Design and Implementation for Novice Researchers,” 2008. Accessed: May 02, 2020. [Online]. Available: https://nsuworks.nova.edu/tqr/vol13/iss4/2Google ScholarGoogle Scholar
  46. S. Ølnes, J. Ubacht, and M. Janssen, “Blockchain in government: Benefits and implications of distributed ledger technology for information sharing,” Government Information Quarterly, vol. 34, no. 3. Elsevier Ltd, pp. 355–364, Sep. 01, 2017. doi: 10.1016/j.giq.2017.09.007.Google ScholarGoogle ScholarCross RefCross Ref
  47. FPS Justice, “Wet tot regeling van een Rijksregister van de natuurlijke personen [Law regulating a National Register of natural persons],” FPS Justice, 1983.Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    DG.O'21: DG.O2021: The 22nd Annual International Conference on Digital Government Research
    June 2021
    600 pages
    ISBN:9781450384926
    DOI:10.1145/3463677

    Copyright © 2021 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 9 June 2021

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited

    Acceptance Rates

    Overall Acceptance Rate150of271submissions,55%

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format .

View HTML Format