ABSTRACT
Self-sovereign identity (SS) has become a trend within the digital identity circles. This new paradigm places a user in the centre and allows them to have more control over their identity information. Such a concept has swiftly found its enthusiasts, who also actively experiment on SSI implementation in the public sector. Although SSI does not imply having any technology at the backbone, it is usually discussed in the blockchain context. This article explores what opportunities this new identity concept can bring to the public sector and the associated challenges in this process. Also, we seek to examine the dependency of SSI on blockchain technology. For this, we study the existing knowledge on SSI from the literature and interview industry experts to elucidate this phenomenon. Using the thematic analysis technique, we propose a framework for assessing the opportunities and challenges, using the case of Belgium as an example, showcasing the potential of SSI and what barriers it still needs to overcome. We conclude that although blockchain does contribute to achieving SSI, it is not the silver bullet for it.
- C. Allen, “The Path to Self-Sovereign Identity,” Life With Alacrity, 2016. http://www.lifewithalacrity.com/2016/04/the-path-to-self-soverereign-identity.html (accessed Nov. 10, 2019).Google Scholar
- G. Hileman and M. Rauchs, “2017 Global Blockchain Benchmarking Study,” SSRN Electronic Journal, Apr. 2018, doi: 10.2139/ssrn.3040224.Google Scholar
- T. Lyons, L. Courcelas, and K. Timsit, “Blockchain and digital identity ,” May 2019.Google Scholar
- S. Ølnes and A. Jansen, Blockchain technology as infrastructure in public sector: an analytical framework. 2018. doi: 10.1145/3209281.3209293.Google Scholar
- A. Mühle, A. Grüner, T. Gayvoronskaya, and C. Meinel, “A survey on essential components of a self-sovereign identity,” Computer Science Review, vol. 30. Elsevier Ireland Ltd, pp. 80–86, Nov. 01, 2018. doi: 10.1016/j.cosrev.2018.10.002.Google ScholarCross Ref
- M. S. Ferdous, F. Chowdhury, and M. O. Alassafi, “In Search of Self-Sovereign Identity Leveraging Blockchain Technology,” IEEE Access, vol. 7, pp. 103059–103079, Jul. 2019, doi: 10.1109/access.2019.2931173.Google ScholarCross Ref
- A. Tobin and D. Reed, “The Inevitable Rise of Self-Sovereign Identity A white paper from the Sovrin Foundation,” 2017.Google Scholar
- Q. Stokkink and J. Pouwelse, “Deployment of a Blockchain-Based Self-Sovereign Identity,” in 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), 2018, pp. 1336–1342. doi: 10.1109/Cybermatics_2018.2018.00230.Google Scholar
- K. C. Toth and A. Anderson-Priddy, “Self-Sovereign Digital Identity: A Paradigm Shift for Identity,” IEEE Security and Privacy, vol. 17, no. 3, pp. 17–27, May 2019, doi: 10.1109/MSEC.2018.2888782.Google ScholarCross Ref
- P. Dunphy and F. A. P. Petitcolas, “A first look at identity management schemes on the blockchain,” IEEE Security and Privacy, vol. 16, no. 4, pp. 20–29, Jul. 2018, doi: 10.1109/MSP.2018.3111247.Google ScholarDigital Library
- D. van Bokkem, R. Hageman, G. Koning, L. Nguyen, and N. Zarin, “Self-Sovereign Identity Solutions: The Necessity of Blockchain Technology,” Apr. 2019, Accessed: Apr. 09, 2020. [Online]. Available: http://arxiv.org/abs/1904.12816Google Scholar
- D. S. Baars, “Towards self-sovereign identity using blockchain technology.” Oct. 2016. [Online]. Available: http://essay.utwente.nl/71274/Google Scholar
- M. van Wingerde, “BLOCKCHAIN-ENABLED SELF-SOVEREIGN IDENTITY An exploratory study into the concept Self-Sovereign Identity and how blockchain technology can serve the fundamental basis” Tilburg, 2017. doi: 10.13140/RG.2.2.17693.82406.Google Scholar
- F. Wang and P. de Filippi, “Self-Sovereign Identity in a Globalized World: Credentials-Based Identity Systems as a Driver for Economic Inclusion ,” Frontiers in Blockchain, vol. 2. p. 28, 2020. [Online]. Available: https://www.frontiersin.org/article/10.3389/fbloc.2019.00028Google ScholarCross Ref
- A. Preukschat and D. Reed, Self-Sovereign Identity: Decentralized Digital Identity and Verifiable Credentials, Manuscript. Manning publications, 2019. [Online]. Available: https://www.manning.com/books/self-sovereign-identityGoogle Scholar
- [16] K. Wagner, B. Némethi, E. Renieris, P. Lang, E. Holst, and B. Eric, “Self-sovereign Identity: A position paper on blockchain enabled identity and the road ahead,” 2018.Google Scholar
- W3C, “Decentralized Identifiers (DIDs) v1.0,” Apr. 21, 2020. https://w3c.github.io/did-core/ (accessed Apr. 27, 2020).Google Scholar
- G. Kondova and J. Erbguth, Self-Sovereign Identity on Public Blockchains and the GDPR. 2020. doi: 10.1145/3341105.3374066.Google ScholarDigital Library
- G. Zyskind, O. Nathan, and A. ’. Pentland, “Decentralizing Privacy: Using Blockchain to Protect Personal Data,” in 2015 IEEE Security and Privacy Workshops, 2015, pp. 180–184. doi: 10.1109/SPW.2015.27.Google ScholarCross Ref
- M. Iansiti and K. R. Lakhani, “The Truth About Blockchain,” Harvard Business Review , no. January-February, pp. 118–127, 2017, Accessed: Feb. 25, 2020. [Online]. Available: https://hbr.org/2017/01/the-truth-about-blockchainGoogle Scholar
- Thales, “National ID cards in Belgium (2020 update) | Thales,” Thales Group, 2020. https://www.thalesgroup.com/en/markets/digital-identity-and-security/government/customer-cases/belgium (accessed May 30, 2020).Google Scholar
- European Commission, “2019 European and Regional Innovation Scoreboards,” 2019. https://ec.europa.eu/commission/presscorner/detail/en/ip_19_2991 (accessed Oct. 28, 2019).Google Scholar
- OECD, OECD Economic Surveys: Belgium 2020. OECD, 2020. doi: 10.1787/1327040c-en.Google Scholar
- Belnet, “Belnet and Smals team up in building infrastructure for European blockchain project | Belnet corporate,” Belnet, Feb. 24, 2020. https://belnet.be/en/news-events/publications/press-review/belnet-and-smals-team-building-infrastructure-european (accessed May 31, 2020).Google Scholar
- European Commission, “Digital Government Factsheets - Belgium,” 2019.Google Scholar
- Deloitte, “The smartphone takes the crown,” 2018. https://mobile-consumer-survey.deloitte.be/2018_the-smartphone-takes-the-crown (accessed May 12, 2020).Google Scholar
- FPS Justice, “Wet 2004-09-01/33,” FPS Justice, 2004. http://www.ejustice.just.fgov.be/cgi_loi/loi_a1.pl?language=fr&caller=list&cn=2003032532&la=f&fromtab=loi&sql=dt=%27arrete royal%27&tri=dd+as+rank&rech=1&numero=1Google Scholar
- FPS Home Affairs, “IBZ in brief,” 2017.Google Scholar
- BOSA, “Development · Fedict/eid-mw Wiki · GitHub,” GitHub.com, 2017. https://github.com/Fedict/eid-mw/wiki/Development (accessed May 30, 2020).Google Scholar
- itsme®, “Partners | itsme®.” https://www.itsme.be/en/partners (accessed Apr. 06, 2020).Google Scholar
- Gemalto, “itsme® – the last word in Digital ID for Belgian citizens,” 2019.Google Scholar
- FPS Justice, “WET 2017-10-22/11,” FPS Justice, 2017. http://www.ejustice.just.fgov.be/cgi_loi/change_lg.pl?language=nl&la=N&table_name=wet&cn=2017102211Google Scholar
- DG Digital Transformation, “Authentic sources DG Digital Transformation,” DG Digital Transformation (in Dutch). https://dt.bosa.be/nl/authentieke_bronnen (accessed May 31, 2020).Google Scholar
- CSAM, “What is CSAM? - CSAM.be.” https://www.csam.be/en/about-csam.html (accessed Feb. 28, 2020).Google Scholar
- IAA, “Identity & Access Management (IAM),” 2019.Google Scholar
- R. K. Yin, Case study research and applications: design and methods, 6th ed., vol. 6. Los Angeles, 2018.Google Scholar
- G. Wolfond, “A Blockchain Ecosystem for Digital Identity: Improving Service Delivery in Canada's Public and Private Sectors,” Technology Innovation Management Review October 2017 (Volume 7, Issue 10), vol. 7, no. 10, 2017.Google Scholar
- A. Abraham, “Whitepaper about the Concept of Self-Sovereign Identity including its Potential,” 2017. Accessed: Apr. 25, 2020. [Online]. Available: www.egiz.gv.atGoogle Scholar
- J. E. Setsaas, “2019’s identity buzzword- Self Sovereign Identity (SSI)- and my concerns with it,” Jan. 01, 2020. https://www.signicat.com/resources/2019s-identity-buzzword-self-sovereign-identity-ssi-and-my-concerns-with-it (accessed Apr. 29, 2020).Google Scholar
- A. Satybaldy, M. Nowostawski, and J. Ellingsen, “Self-Sovereign Identity Systems: Evaluation Framework,” 2020, pp. 447–461. doi: 10.1007/978-3-030-42504-3_28.Google Scholar
- P. C. Bartolomeu, E. Vieira, S. M. Hosseini, and J. Ferreira, “Self-Sovereign Identity: Use-cases, Technologies, and Challenges for Industrial IoT,” in IEEE International Conference on Emerging Technologies and Factory Automation, ETFA, Sep. 2019, vol. 2019-September, pp. 1173–1180. doi: 10.1109/ETFA.2019.8869262.Google ScholarDigital Library
- U. Der, S. Jähnichen, and J. Sürmeli, “Self-sovereign Identity – Opportunities and Challenges for the Digital Revolution,” 2017.Google Scholar
- [43] W. van Dongen, “The potential of blockchain technology for the public sector,” Leuven: KU Leuven. Faculteit Economie en Bedrijfswetenschappen, 2019.Google Scholar
- M. Saunders, P. Lewis, and A. Thornhill, “Research Methods for Business Students,” Jan. 2009.Google Scholar
- P. Baxter and S. Jack, “The Qualitative Report Qualitative Case Study Methodology: Study Design and Implementation for Novice Researchers,” 2008. Accessed: May 02, 2020. [Online]. Available: https://nsuworks.nova.edu/tqr/vol13/iss4/2Google Scholar
- S. Ølnes, J. Ubacht, and M. Janssen, “Blockchain in government: Benefits and implications of distributed ledger technology for information sharing,” Government Information Quarterly, vol. 34, no. 3. Elsevier Ltd, pp. 355–364, Sep. 01, 2017. doi: 10.1016/j.giq.2017.09.007.Google ScholarCross Ref
- FPS Justice, “Wet tot regeling van een Rijksregister van de natuurlijke personen [Law regulating a National Register of natural persons],” FPS Justice, 1983.Google Scholar
Recommendations
Self-sovereign identity on public blockchains and the GDPR
SAC '20: Proceedings of the 35th Annual ACM Symposium on Applied ComputingThis paper studies three existing technical solutions for a self-sovereign identity on blockchains and analyzes the arising issues related to the General Data Protection Regulation (GDPR) of the European Union (EU). In particular, the paper provides an ...
Design Patterns for Blockchain-based Self-Sovereign Identity
EuroPLoP '20: Proceedings of the European Conference on Pattern Languages of Programs 2020Self-sovereign identity is a new identity management paradigm that allows entities to really have the ownership of their identity data and control their use without involving any intermediary. Blockchain is an enabling technology for building self-...
Blockchain-Based Self-Sovereign Identity: Survey, Requirements, Use-Cases, and Comparative Study
WI-IAT '21: IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent TechnologyIdentity is at the heart of digital transformation. Successful digital transformation requires confidence in and protection of digital identities. On the Internet, however, there is no unique and standard identity layer. Consequently, a variety of ...
Comments