Self-Sovereign Identity Specifications: Govern Your Identity Through Your Digital Wallet using Blockchain Technology

Digital identity is one of the biggest challenges in cyberspace. This field has been evolving for many decades with a number of Identity Management (IDM) models being proposed and employed; however, few were able to solve the issue of sovereignty of an identity and storage-control of its associated personal and confidential data. Self-Sovereign Identity (SSI) was introduced to solve this crucial issue offering a user full sovereignty of their identity and storage-control of their associated personal and confidential data. Alongside ownership of an identity, it maintains all private information in a Digital Wallet which is owned and controlled by the user. However, SSI is an emerging IDM, therefore it requires careful evaluation of various aspects of SSI for it to become an operative IDM. This paper proposes several specifications to evaluate any SSI solution. Subsequently, it analyses two emerging SSI solutions uPort and Sovrin. Finally, an evaluation of uPort and Sovrin SSI is performed utilising the proposed specifications, highlighting their strengths and limitations.

[1]  Nitin Naik,et al.  Choice of suitable Identity and Access Management standards for mobile computing and communication , 2017, 2017 24th International Conference on Telecommunications (ICT).

[2]  Nitin Naik,et al.  A Secure Mobile Cloud Identity: Criteria for Effective Identity and Access Management Standards , 2016, 2016 4th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud).

[3]  Nitin Naik,et al.  An Analysis of Open Standard Identity Protocols in Cloud Computing Security Paradigm , 2016, 2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech).

[4]  Nitin Naik,et al.  Securing digital identities in the cloud by selecting an apposite Federated Identity Management from SAML, OAuth and OpenID Connect , 2017, 2017 11th International Conference on Research Challenges in Information Science (RCIS).

[5]  K. Cameron The Laws of Identity , 2005 .