A Systematic Review of Blockchain-based Identity Management Solutions
Abstract views: 204 / PDF downloads: 215
Keywords:Digital Identity, Identity Management, Self-sovereign Identity, Decentralization, Blockchain
The involvement of digital identity in almost all online services contributes to the growing reliance on Identity Management Systems (IDMS) that establish, verify, and manage digital identities. However, digital identities are still kept in central repositories. Which are controlled by a single authority that may have many vulnerabilities due to low security, leading attackers to exploit these vulnerabilities and causing various security breaches such as identity theft or disclosure of sensitive information. Additionally, powerful entities who have access to these repositories, could gather and abuse users' information without their knowledge or consent. The concept of Self-sovereign Identity (SSI) allows users to exert ownership of their identity and gain insight into how their data is being used. The development of Blockchain technology has made a breakthrough in achieving SSI by giving individuals the ability to be the final arbiter of who can access and use their own identity. This paper overviews the traditional identity management (IdM) models and presents the next generation of distributed IDMS using Blockchain technology that targets user-centricity and eliminates the identity provider as a trusted third party. Furthermore, It gives an analysis of the recent Blockchain-based IdM solutions, discussing their architecture, components, and features. It also, reveals their weaknesses to identify the gaps between these solutions for future secure IDMS.
T. Rathee and P. Singh, “A systematic literature mapping on secure identity management using blockchain technology,” Journal of King Saud University - Computer and Information Sciences. King Saud bin Abdulaziz University, 2021. doi: 10.1016/j.jksuci.2021.03.005.
M. Shuaib et al., “Self-Sovereign Identity Solution for Blockchain-Based Land Registry System: A Comparison,” Mobile Information Systems, vol. 2022. Hindawi Limited, 2022. doi: 10.1155/2022/8930472.
B. Faber, G. Michelet, N. Weidmann, R. Rao Mukkamala, and R. Vatrapu, BPDIMS:A Blockchain-based Personal Data and Identity Management System. [Online]. Available: https://hdl.handle.net/10125/60121
C. Lundkvist, R. Heck, J. Torstensson, Z. Mitton, and M. Sena, “UPORT: A PLATFORM FOR SELF-SOVEREIGN IDENTITY,” 2016. Accessed: May 26, 2022. [Online]. Available: https://blockchainlab.com/pdf/uPort_whitepaper_DRAFT20161020.pdf
M. K. Hamza, H. Abubakar, and Y. M. Danlami, “Identity and Access Management System: a Web-Based Approach for an Enterprise,” Path of Science, vol. 4, no. 11, pp. 2001–2011, Nov. 2018, doi: 10.22178/pos.40-1.
Y. Liu, D. He, M. S. Obaidat, N. Kumar, M. K. Khan, and K. K. Raymond Choo, “Blockchain-based identity management systems: A review,” Journal of Network and Computer Applications, vol. 166. Academic Press, Sep. 15, 2020. doi: 10.1016/j.jnca.2020.102731.
N. Chaudhry and M. Yousaf, “Consensus Algorithms in Blockchain: Comparative Analysis, Challenges and Opportunities,” in 2018 International Conference on Open Source Systems and Technologies (ICOSST), 2018.
G. T. Nguyen and K. Kim, “A survey about consensus algorithms used in Blockchain,” Journal of Information Processing Systems, vol. 14, no. 1, pp. 101–128, 2018, doi: 10.3745/JIPS.01.0024.
O. Dib and K. Toumi, “Decentralized identity systems: Architecture, challenges, solutions and future directions,” Annals of Emerging Technologies in Computing, vol. 4, no. 5. International Association for Educators and Researchers (IAER), pp. 19–40, 2020. doi: 10.33166/AETIC.2020.05.002.
R. Al-Amri, N. H. Zakaria, A. Habbal, and S. Hassan, “Cryptocurrency adoption: current stage, opportunities, and open challenges,” International Journal of Advanced Computer Research, vol. 9, no. 44, pp. 293–307, Sep. 2019, doi: 10.19101/ijacr.pid43.
J. Pan, Y. Liu, J. Wang, and A. Hester, “Key Enabling Technologies for Secure and Scalable Future Fog-IoT Architecture: A Survey,” Jun. 2018, [Online]. Available: http://arxiv.org/abs/1806.06188
S. Tanwar, K. Parekh, and R. Evans, “Blockchain-based electronic healthcare record system for healthcare 4.0 applications,” Journal of Information Security and Applications, vol. 50, Feb. 2020, doi: 10.1016/j.jisa.2019.102407.
M. N. M. Bhutta et al., “A Survey on Blockchain Technology: Evolution, Architecture and Security,” IEEE Access, vol. 9. Institute of Electrical and Electronics Engineers Inc., pp. 61048–61073, 2021. doi: 10.1109/ACCESS.2021.3072849.
H. Sun, X. Wang, and X. Wang, “Application of blockchain technology in online education,” International Journal of Emerging Technologies in Learning, vol. 13, no. 10, pp. 252–259, 2018, doi: 10.3991/ijet.v13i10.9455.
P. Dunphy and F. A. P. Petitcolas, “A first look at identity management schemes on the blockchain,” IEEE Secur Priv, vol. 16, no. 4, pp. 20–29, Jul. 2018, doi: 10.1109/MSP.2018.3111247.
“ShoCard.” https://www.shocard.com/en.html (accessed May 26, 2022).
J. A. Kassem, S. Sayeed, H. Marco-Gisbert, Z. Pervez, and K. Dahal, “DNS-IdM: A blockchain identity management system to secure personal data sharing in a network,” Applied Sciences (Switzerland), vol. 9, no. 15, 2019, doi: 10.3390/app9152953.
I. T. Javed, F. Alharbi, B. Bellaj, T. Margaria, N. Crespi, and K. N. Qureshi, “Health-id: A blockchain-based decentralized identity management for remote healthcare,” Healthcare (Switzerland), vol. 9, no. 6, Jun. 2021, doi: 10.3390/healthcare9060712.
S. M. Karim, A. Habbal, S. A. Chaudhry, and A. Irshad, “BSDCE-IoV: Blockchain-Based Secure Data Collection and Exchange Scheme for IoV in 5G Environment,” IEEE Access, 2023, doi: 10.1109/ACCESS.2023.3265959.
M. Shimaoka and N. Sonehara, “Modeling the cost structure of identity proofing,” in Proceedings - IEEE 38th Annual International Computers, Software and Applications Conference Workshops, COMPSACW 2014, Institute of Electrical and Electronics Engineers Inc., Sep. 2014, pp. 180–185. doi: 10.1109/COMPSACW.2014.34.