Analysis of Identity Management Systems Using Blockchain Technology

The emergence of Blockchain technology as the biggest innovations of the 21stcentury, has given rise to new concepts of Identity Management to deal with the privacy and security challenges on the one hand, and to enhance the decentralization and user control in transactions on Blockchain infrastructures on the other hand. This paper investigates and gives analysis of the most popular Identity Management Systems using Blockchain: uPort, Sovrin, and ShoCard. It then evaluates them under a set of features of digital identity that characterizes the successful of an Identity Management solution. The result of the comparative analysis is presented in a concise way to allow readers to find out easily which systems satisfy what requirements in order to select the appropriate one to fit into a specific scenario.

[1]  R. Kaur,et al.  Digital Signature , 2012, 2012 International Conference on Computing Sciences.

[2]  Mario Zagar,et al.  Comparative analysis of blockchain consensus algorithms , 2018, 2018 41st International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO).

[3]  Chris Speed,et al.  Making Sense of Blockchain Applications: A Typology for HCI , 2018, CHI.

[4]  B SchneiderFred Implementing fault-tolerant services using the state machine approach: a tutorial , 1990 .

[5]  Praveen Gauravaram,et al.  Cryptographic Hash Functions , 2010, Encyclopedia of Information Assurance.

[6]  Phillip J. Windley Digital identity , 2005 .

[7]  Miss Laiha Mat Kiah,et al.  Blockchain Technology the Identity Management and Authentication Service Disruptor: A Survey , 2018, International Journal on Advanced Science, Engineering and Information Technology.

[8]  Spencer C. Lee An Introduction to Identity Management , 2003 .

[9]  Milton L. Mueller,et al.  Digital identity: How users value the attributes of online identifiers , 2006, Inf. Econ. Policy.

[10]  K. Cameron The Laws of Identity , 2005 .

[11]  Christoph Meinel,et al.  A Survey on Essential Components of a Self-Sovereign Identity , 2018, Comput. Sci. Rev..

[12]  Hicham Lakhlef,et al.  Internet of things security: A top-down survey , 2018, Comput. Networks.

[13]  Jim Groom,et al.  The Path to Self-Sovereign Identity , 2017 .

[14]  Daniel Davis Wood,et al.  ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER , 2014 .

[15]  Mihaela van der Schaar,et al.  Peer-to-Peer Networks – Protocols , Cooperation and Competition , 2010 .

[16]  Mohamed Dâfir Ech-Cherif El Kettani,et al.  Towards an Interoperable Identity Management Framework: a Comparative Study , 2019, ArXiv.

[17]  Satoshi Nakamoto Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .

[18]  Survey on Blockchain Technologies and Related Services FY2015 Report , 2016 .

[19]  Anuj Prakash,et al.  Block-Chain: An Evolving Technology , 2017 .

[20]  Vivien Quéma,et al.  RBFT: Redundant Byzantine Fault Tolerance , 2013, 2013 IEEE 33rd International Conference on Distributed Computing Systems.

[21]  Kirsten Lamb,et al.  Blockchain and Smart Contracts: What the AEC sector needs to know , 2018 .

[22]  Fred B. Schneider,et al.  Implementing fault-tolerant services using the state machine approach: a tutorial , 1990, CSUR.

[23]  Iddo Bentov,et al.  Proof of Activity: Extending Bitcoin's Proof of Work via Proof of Stake [Extended Abstract]y , 2014, PERV.

[24]  P. Thompson Digital Identity , 2003 .

[25]  Karen A. Scarfone,et al.  Blockchain Technology Overview , 2018, ArXiv.