Towards a trustful digital world: exploring self-sovereign identity
ecosystems
- URL: http://arxiv.org/abs/2105.15131v3
- Date: Mon, 13 Sep 2021 11:51:03 GMT
- Title: Towards a trustful digital world: exploring self-sovereign identity
ecosystems
- Authors: Gabriella Laatikainen, Taija Kolehmainen, Mengcheng Li, Markus
Hautala, Antti Kettunen and Pekka Abrahamsson
- Abstract summary: Self-sovereign identity (SSI) solutions rely on distributed ledger technologies and verifiable credentials.
This paper builds on observations gathered in a field study to identify the building blocks, antecedents and possible outcomes of SSI ecosystems.
- Score: 4.266530973611429
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: In the current global situation-burdened by, among others, a vast number of
people without formal identification, digital leap, the need for health
passports and contact tracking applications-providing private and secure
digital identity for individuals, organizations and other entities is crucial.
The emerging self-sovereign identity (SSI) solutions rely on distributed ledger
technologies and verifiable credentials and have the potential to enable
trustful digital interactions. In this human-centric paradigm, trust among
actors can be established in a decentralized manner while the identity holders
are able to own and control their confidential data. In this paper, we build on
observations gathered in a field study to identify the building blocks,
antecedents and possible outcomes of SSI ecosystems. We also showcase
opportunities for researchers and practitioners to investigate this phenomenon
from a wide range of domains and theories, such as the digital innovation
ecosystems, value co-creation, surveillance theory, or entrepreneurship
theories.
Related papers
- Deepfake Media Forensics: State of the Art and Challenges Ahead [51.33414186878676]
AI-generated synthetic media, also called Deepfakes, have influenced so many domains, from entertainment to cybersecurity.
Deepfake detection has become a vital area of research, focusing on identifying subtle inconsistencies and artifacts with machine learning techniques.
This paper reviews the primary algorithms that address these challenges, examining their advantages, limitations, and future prospects.
arXiv Detail & Related papers (2024-08-01T08:57:47Z) - SSI4IoT: Unlocking the Potential of IoT Tailored Self-Sovereign Identity [5.025528181278946]
Self-Sovereign Identity (SSI) techniques move control of digital identity from conventional identity providers to individuals.
Existing applications of SSI mainly focus on creating person-to-person and person-to-service relationships.
arXiv Detail & Related papers (2024-05-03T20:31:52Z) - SoK: Trusting Self-Sovereign Identity [7.018013919723054]
Digital identity is evolving from centralized systems to a decentralized approach known as Self-Sovereign Identity (SSI)
This paper systematically analyzes trust in SSI in light of its components and threats posed by various actors in the system.
arXiv Detail & Related papers (2024-04-10T04:28:50Z) - A Survey on Decentralized Identifiers and Verifiable Credentials [17.808225768298495]
Self-Sovereign Identity (SSI) gives users full control over their data.
SSI leverages decentralized identifiers (DIDs) and verifiable credentials (VCs)
These technologies have the potential to build more secure and decentralized digital identity systems.
arXiv Detail & Related papers (2024-02-04T11:55:14Z) - AI and Democracy's Digital Identity Crisis [0.0]
Privacy-preserving identity attestations can drastically reduce instances of impersonation and make disinformation easy to identify and potentially hinder.
In this paper, we discuss attestation types, including governmental, biometric, federated, and web of trust-based.
We believe these systems could be the best approach to authenticating identity and protecting against some of the threats to democracy that AI can pose in the hands of malicious actors.
arXiv Detail & Related papers (2023-09-25T14:15:18Z) - Auditing and Generating Synthetic Data with Controllable Trust Trade-offs [54.262044436203965]
We introduce a holistic auditing framework that comprehensively evaluates synthetic datasets and AI models.
It focuses on preventing bias and discrimination, ensures fidelity to the source data, assesses utility, robustness, and privacy preservation.
We demonstrate the framework's effectiveness by auditing various generative models across diverse use cases.
arXiv Detail & Related papers (2023-04-21T09:03:18Z) - Biometrics: Trust, but Verify [49.9641823975828]
Biometric recognition has exploded into a plethora of different applications around the globe.
There are a number of outstanding problems and concerns pertaining to the various sub-modules of biometric recognition systems.
arXiv Detail & Related papers (2021-05-14T03:07:25Z) - Digital Twins: State of the Art Theory and Practice, Challenges, and
Open Research Questions [62.67593386796497]
This work explores the various DT features and current approaches, the shortcomings and reasons behind the delay in the implementation and adoption of digital twin.
The major reasons for this delay are the lack of a universal reference framework, domain dependence, security concerns of shared data, reliance of digital twin on other technologies, and lack of quantitative metrics.
arXiv Detail & Related papers (2020-11-02T19:08:49Z) - Efficiency in Digital Economies -- A Primer on Tokenomics [55.41644538483948]
cryptographic tokens are a new digital paradigm that can facilitate the establishment of economic incentives in digital ecoystems.
We show how certain principles and values that arise from the evolutionary process of digital cooperation can lead to a market economy characterized by economic efficiency of both individuals and the tokenized ecosystem as a whole.
arXiv Detail & Related papers (2020-08-06T09:31:56Z) - Framework for a DLT Based COVID-19 Passport [0.0]
We describe a mechanism that allows one to store the COVID-19 vaccination details of individuals on a publicly readable, decentralised, immutable blockchain.
Our main contribution is the employment of a provably secure input-hiding, locality-sensitive hashing algorithm over an iris extraction technique.
arXiv Detail & Related papers (2020-08-03T18:28:19Z) - Deep Learning for Person Re-identification: A Survey and Outlook [233.36948173686602]
Person re-identification (Re-ID) aims at retrieving a person of interest across multiple non-overlapping cameras.
By dissecting the involved components in developing a person Re-ID system, we categorize it into the closed-world and open-world settings.
arXiv Detail & Related papers (2020-01-13T12:49:22Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.