skip to main content
10.1145/3491087.3493682acmconferencesArticle/Chapter ViewAbstractPublication PagesmiddlewareConference Proceedingsconference-collections
short-paper

Using blockchain technology for software identity maintenance

Published:06 December 2021Publication History

ABSTRACT

Recently, the number of entities in the digital world has increased, due to technologies like 5G and the Internet of Things (IoT). Therefore, in a software application, it is important to be able to identify and maintain entities in an interoperable, efficient, and secure way. For enhancing the identity management domain, blockchain technology has been proposed as a possible solution. We explore how blockchain technology can be used to maintain digital identities and to address some of the issues in the domain. We present the results that we obtained so far, as well as future directions and expected results for our research.

References

  1. General Data Protection Regulation (GDPR). https://gdpr-info.eu/art-5-gdpr.Google ScholarGoogle Scholar
  2. Andreea-Elena Panait, Ruxandra F. Olimid, and Alin Stefanescu, 2020. Identity Management on Blockchain - Privacy and Security Aspects. ArXiv, abs/2004.13107.Google ScholarGoogle Scholar
  3. Paul Dunphy, Luke. Garratt, and Fabien Petitcolas, 2018. Decentralizing Digital Identity: Open Challenges for Distributed Ledgers. 2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), London, pp. 75--78.Google ScholarGoogle ScholarCross RefCross Ref
  4. Garrick Hileman and Michel Rauchs, 2017. Global blockchain benchmarking study. https://www.jbs.cam.ac.uk/faculty-research/centres/alternative-finance/publications/global-blockchain.Google ScholarGoogle Scholar
  5. Deloitte. Breaking blockchain open, 2018. https://www2.deloitte.com/content/dam/Deloitte/cz/Documents/financial-services/cz-2018-deloitte-global-blockchain-survey.pdf.Google ScholarGoogle Scholar
  6. uPort, 2021. https://www.uport.me.Google ScholarGoogle Scholar
  7. Paul Dunphy and Fabien A. P. Petitcolas, 2018. A First Look at Identity Management Schemes on the Blockchain. IEEE Security & Privacy, 16, 4, pp. 20--29.Google ScholarGoogle ScholarCross RefCross Ref
  8. Julian Roos and Heiko Niedermayer, 2018. Identity Management on the Blockchain. Seminars FI / IITM SS 18, Network Architectures and Services.Google ScholarGoogle Scholar
  9. Andrew Tobin and Drummond Reed, 2016. The inevitable rise of self-sovereign identity. https://sovrin.org/wp-content/uploads/2018/03/The-Inevitable-Rise-of-Self-Sovereign-Identity.pdf.Google ScholarGoogle Scholar
  10. Alexander Mühle, Andreas Grüner, Tatiana Gayvoronskaya, and Christoph Meinel, 2018. A Survey on Essential Components of a Self-Sovereign Identity. Computer Science Review 30 (2018): 80--86.Google ScholarGoogle ScholarCross RefCross Ref
  11. Xiaoyang Zhu and Youakim Badr, 2018. Identity Management Systems for the Internet of Things: A Survey Towards Blockchain Solutions. Sensors, 18(12):4215.Google ScholarGoogle ScholarCross RefCross Ref
  12. Reza Soltani, Uyen Trang Nguyen, and Aijun AN, 2018. A New Approach to Client Onboarding Using Self-Sovereign Identity and Distributed Ledger. In 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), pp. 1129--1136. IEEE.Google ScholarGoogle Scholar
  13. Dirk van Bokkem, Rico Rageman, Gijs Koning, Luat Nguyen, and Naqib Zarin, 2019. Self-Sovereign Identity Solutions: The Necessity of Blockchain Technology. arXiv:1904.12816.Google ScholarGoogle Scholar
  14. Christopher Allen, 2016. The path to self-sovereign identity. http://www.lifewithalacrity.com/2016/04/the-path-to-self-soverereign-identity.html.Google ScholarGoogle Scholar
  15. Sam Mire, 2019. Blockchain For Identity Management: 33 Startups To Watch In 2019. https://www.disruptordaily.com/blockchain-startups-identity-management.Google ScholarGoogle Scholar
  16. Alexandre Miranda Pinto, 2020. An Introduction to the use of zk-SNARKs in Blockchains, pp. 233--249(01 2020). 16. Google ScholarGoogle ScholarCross RefCross Ref
  17. Jeonghyuk Lee, Jungyeon Hwang, Jaekyung Choi, Hyunok Oh, and Jihye Kim, 2019. Sims: Self sovereign identity management system with preserving privacy in blockchain. IACR Cryptol. ePrint Arch. 2019, 1241.Google ScholarGoogle Scholar
  18. Andreea-Elena Panait, Ruxandra F. Olimid, and A Stefanescu, 2020. Analysis of uPort Open, an Identity Management Blockchain-Based Solution. In: Gritzalis S., Weippl E.R., Kotsis G., Tjoa A.M., Khalil I. (eds) Trust, Privacy and Security in Digital Business. TrustBus 2020. Lecture Notes in Computer Science, vol 12395. Springer, Cham. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Andreea-Elena Panait, 2020. Is the user identity perception influenced by the blockchain technology? IEEE International Conference on Intelligence and Security Informatics (ISI), pp. 1--3 Google ScholarGoogle ScholarCross RefCross Ref
  20. Andreea-Elena Panait and Ruxandra F. Olimid, 2021. On Using zk-SNARKs and zk-STARKs in Blockchain-Based Identity Management. In: Maimut D., Oprina AG., Sauveron D. (eds) Innovative Security Solutions for Information Technology and Communications. SecITC 2020. Lecture Notes in Computer Science, vol 12596. Springer, Cham. 2020. Google ScholarGoogle ScholarCross RefCross Ref
  21. Nir Bitansky, Ran Canetti, Alessandro Chiesa, and Eran Tromer, 2012. From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again. In: Proceedings of the 3rd Innovations in Theoretical Computer Science Conference. pp. 326--349. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Eli Ben-Sasson, Iddo Bentov, Yinon Horesh, and Michael Riabzev, 2018. Scalable, transparent, and post-quantum secure computational integrity. IACR Cryptology ePrint Archive 2018, 46.Google ScholarGoogle Scholar
  23. ZoKrates, 2020. Zokrates tutorial. https://zokrates.github.io.Google ScholarGoogle Scholar
  24. Remix, 2019. Remix Ethereum-IDE Tool. https://remix.ethereum.org.Google ScholarGoogle Scholar
  25. Sorin Ţeican, Andreea-Elena Drăgnoiu, 2021. A state-of-the-art blockchain approach to the ETSI implementation for long-term preservation of digital signatures/seals (LTPS) solutions. To be published.Google ScholarGoogle Scholar
  26. The Linux Foundation. Hyperledger IROHA, 2021. https://www.hyperledger.org/use/iroha.Google ScholarGoogle Scholar
  27. Adem Efe Gencer, Soumya Basu, Ittay Eyal, Robbert van Renesse, and Emin Gün Sirer, 2018. Decentralization in Bitcoin and Ethereum networks. arXiv, preprint arXiv:1801.03998.Google ScholarGoogle Scholar
  28. Mina Protocol, 2021. https://minaprotocol.com.Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Conferences
    Middleware '21: Proceedings of the 22nd International Middleware Conference: Doctoral Symposium
    December 2021
    38 pages
    ISBN:9781450391559
    DOI:10.1145/3491087

    Copyright © 2021 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 6 December 2021

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • short-paper

    Acceptance Rates

    Overall Acceptance Rate203of948submissions,21%

    Upcoming Conference

    MIDDLEWARE '24
    25th International Middleware Conference
    December 2 - 6, 2024
    Hong Kong , Hong Kong
  • Article Metrics

    • Downloads (Last 12 months)23
    • Downloads (Last 6 weeks)2

    Other Metrics

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader