skip to main content
10.1145/3581971.3581992acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicbtaConference Proceedingsconference-collections
research-article
Open access

Self-Sovereign Identity for Privacy-Preserving Shipping Verification System

Published: 06 April 2023 Publication History

Abstract

Internet made it easier for organizations and individuals to collaborate with each other in different activities in order to provide new goods and services to their customers. As for example, e-commerce facilitates the discovery of new partners and allows companies to conduct business. However, in such open environment ensuring transparency of the supply chain activities and privacy of the customers is a challenging task. Indeed, individuals do not know each other and the centralized architecture of Internet services does not allow individuals to control their credentials. To overcome this challenge, this paper exploits the concept of Self Sovereign Identity (SSI) for providing digital identity, trust, and privacy in the context of a Shipping Verification System, a very important activity in supply chain management. In particular, the proposed system relies on decentralized identifiers, verifiable credentials, and blockchain to allow customers to monitor the shipment of items by a shipping deliverer, on behalf of a marketplace. We implemented an instance of the proposed system, and we show that it achieves good performance results in two popular deployment configurations: a Local Indy Pool (consisting of 4 nodes) and the Sovrin BuilderNet (a developer test network consisting of 17 node).

References

[1]
A. Preukschat and D. Reed, Self-sovereign identity. Manning Publications, 2021
[2]
A. Abid, S. Cheikhrouhou, S. Kallel, and M. Jmaiel, “Novidchain: Blockchain-based privacy-preserving platform for covid-19 test/vaccine certificates,” Software: Practice and Experience, 2021.
[3]
D. W. Chadwick, R. Laborde, A. Oglaza, R. Venant, S. Wazan, and M. Nijjar, “Improved identity management with verifiable credentials and fido,” IEEE Communications Standards Magazine, vol. 3, no. 4, pp. 14–20, 2019
[4]
A. Queiruga-Dios, J. Jos ́e Bull ́on P ́erez, and L. Hern ́andez Encinas, “Self-sovereign identity in university context,” in 2022 31st Conference of Open Innovations Association (FRUCT), 2022, pp. 259–264
[5]
H. Narumanchi, L. P. Maddali, and N. Emmadi, “Privacy enabled immunity credential system on blockchain,” in 2022 14th International Conference on COMmunication Systems & NETworkS (COMSNETS). IEEE, 2022, pp. 1–6
[6]
L. Stockburger, G. Kokosioulis, A. Mukkamala, R. R. Mukkamala, and M. Avital, “Blockchain-enabled decentralized identity management: The case of self-sovereign identity in public transportation,” Blockchain: Research and Applications, vol. 2, no. 2, p. 100014, 2021
[7]
L. Cocco, R. Tonelli, and M. Marchesi, “Blockchain and self sovereign identity to support quality in the food supply chain,” Future Internet, vol. 13, no. 12, p. 301, 2021
[8]
K. Li, J.-Y. Lee, and A. Gharehgozli, “Blockchain in food supply chains: a literature review and synthesis analysis of platforms, benefits and challenges,” International Journal of Production Research, pp. 1–20, 2021
[9]
G. Blossey, J. Eisenhardt, and G. Hahn, “Blockchain technology in supply chain management: An application perspective,” in Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019.
[10]
K. Stouffer, M. Pease, J. Lubell, E. Wallace, H. Reed, V. L. Martin, Granata, A. Noh, and C. Freeberg, “Blockchain and related technologies to support manufacturing supply chain traceability,” National Institute of Standards and Technology, vol. NISTIR, no. 8419, 2022
[11]
H. Indy, “Transactions,” https://hyperledger-indy.readthedocs.io/projects/node/en/latest/transactions.html [Accessed on 4 May 2022], 2018, [Hyperledger Revision ebf330f8].
[12]
Hyperledger, “Indy Plemnum: Audit Ledger,” Online https://hyperledger-indy.readthedocs.io/projects/plenum/en/latest/audit_ledger.html [Accessed on 4 May 2022]
[13]
H. Indy, “Plenum Byzantine Fault Tolerant Protocol,” https://github.com/hyperledger/indy-plenum [Accessed on 4 May 2022]
[14]
P.-L. Aublin, S. B. Mokhtar, and V. Qu ́ema, “Rbft: Redundant byzantine fault tolerance,” in 2013 IEEE 33rd International Conference on Distributed Computing Systems. IEEE, 2013, pp. 297–306
[15]
M. Sporny, D. Longley, and D. Chadwick, “Verifiable credentials data model v1.1 (W3C proposed recommendation 03 august 2021),” Online https://www.w3.org/TR/vc-data-model/ [Accessed on 4 May 2022]
[16]
P. C. Bartolomeu, E. Vieira, S. M. Hosseini, and J. Ferreira, “Self-sovereign identity: Use-cases, technologies, and challenges for industrial iot,” in 2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), 2019, pp. 1173–1180
[17]
Y. Kortesniemi, D. Lagutin, T. Elo, and N. Fotiou, “Improving the privacy of iot with decentralised identifiers (dids),” Journal of Computer Networks and Communications, vol. 2019, 2019
[18]
J. Eberhardt and S. Tai, “On or off the blockchain? insights on off-chaining computation and data,” in Service-Oriented and Cloud Computing, F. De Paoli, S. Schulte, and E. Broch Johnsen, Eds. Cham: Springer International Publishing, 2017, pp. 3–1
[19]
I. A. Omar, R. Jayaraman, M. S. Debe, H. R. Hasan, K. Salah, and M. Omar, “Supply chain inventory sharing using ethereum blockchain and smart contracts,” IEEE Access, vol. 10, pp. 2345–2356, 2021
[20]
F. Mizutani and S. Uranishi, “The post office vs. parcel delivery companies: competition effects on costs and productivity,” Journal of Regulatory Economics, vol. 23, no. 3, pp. 299–319, 200

Index Terms

  1. Self-Sovereign Identity for Privacy-Preserving Shipping Verification System

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Other conferences
      ICBTA '22: Proceedings of the 2022 5th International Conference on Blockchain Technology and Applications
      December 2022
      192 pages
      ISBN:9781450397575
      DOI:10.1145/3581971
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 06 April 2023

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. Blockchain
      2. Data privacy
      3. Identity management
      4. Self sovereign identity
      5. Supply chain

      Qualifiers

      • Research-article
      • Research
      • Refereed limited

      Conference

      ICBTA 2022

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • 0
        Total Citations
      • 501
        Total Downloads
      • Downloads (Last 12 months)270
      • Downloads (Last 6 weeks)41
      Reflects downloads up to 07 Mar 2025

      Other Metrics

      Citations

      View Options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format.

      HTML Format

      Login options

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media