Towards an identity management solution on Arweave
- URL: http://arxiv.org/abs/2412.13865v3
- Date: Fri, 20 Dec 2024 15:06:01 GMT
- Title: Towards an identity management solution on Arweave
- Authors: Andreea Elena Dragnoiu, Ruxandra F. Olimid,
- Abstract summary: This paper explores the potential of using Arweave network to develop an identity management solution.
By harnessing Arweave's permanent storage, our solution offers users Self-Sovereign Identity (SSI) framework.
- Score: 0.0
- License:
- Abstract: Traditional identity management systems, often centralized, face challenges around privacy, data security, and user control, leaving users vulnerable to data breaches and misuse. This paper explores the potential of using the Arweave network to develop an identity management solution. By harnessing Arweave's permanent storage, our solution offers the users a Self-Sovereign Identity (SSI) framework, that uses Decentralized Identifiers (DIDs) and Verifiable Credentials (VCs) to allow individuals and other entities to create, own, and manage their digital identities. Further, the solution integrates privacy-preserving technologies, including zero-knowledge proofs and the BBS(+) signature scheme, enabling selective disclosure. This approach ultimately enhances user privacy and supports compliance with European Union legislation and regulatory standards like the General Data Protection Regulation (GDPR) by design.
Related papers
- SLVC-DIDA: Signature-less Verifiable Credential-based Issuer-hiding and Multi-party Authentication for Decentralized Identity [15.346928617367338]
Verifiable Credential techniques are used to facilitate decentralized DID-based access control across multiple entities.
Existing DID schemes generally rely on a distributed public key infrastructure that also causes challenges.
This paper proposes a Permanent-Hiding (PIH)-based DID-based multi-party authentication framework with a signature-less VC model, named SLVC-DIDA.
arXiv Detail & Related papers (2025-01-19T13:58:01Z) - Distributed Identity for Zero Trust and Segmented Access Control: A Novel Approach to Securing Network Infrastructure [4.169915659794567]
This study assesses security improvements achieved when distributed identity is employed with ZTA principle.
The study suggests adopting distributed identities can enhance overall security postures by an order of magnitude.
The research recommends refining technical standards, expanding the use of distributed identity in practice, and its applications for the contemporary digital security landscape.
arXiv Detail & Related papers (2025-01-14T00:02:02Z) - Token-based identity management in the distributed cloud [0.0]
This research paper centres on identity management in distributed environments.
The paper concentrates on implementing robust security paradigms to minimise communication overhead among services.
The proposed solution incorporates an Identity and Access Management server as a component that authenticates all external requests.
arXiv Detail & Related papers (2024-10-29T09:00:01Z) - On the Compliance of Self-Sovereign Identity with GDPR Principles: A Critical Review [0.0]
Self-sovereign identity (SSI) was introduced as an IdM model to reduce the possibility of data breaches.
SSI is a decentralised IdM, where the data owner has sovereign control of personal data stored in their digital wallet.
This paper provides an evolution to IdMs and reviews state-of-the-art SSI frameworks.
arXiv Detail & Related papers (2024-09-05T15:35:53Z) - Self-Sovereign Identity for Consented and Content-Based Access to Medical Records using Blockchain [1.118478900782898]
We propose a blockchain-based solution enabling secure exchange of EHRs between different parties powered by a self-sovereign identity wallet and decentralized identifiers.
We grant users full control over their medical data, and enable them to securely share it in total confidentiality over secure communication channels.
arXiv Detail & Related papers (2024-07-31T12:27:31Z) - HFORD: High-Fidelity and Occlusion-Robust De-identification for Face
Privacy Protection [60.63915939982923]
Face de-identification is a practical way to solve the identity protection problem.
The existing facial de-identification methods have revealed several problems.
We present a High-Fidelity and Occlusion-Robust De-identification (HFORD) method to deal with these issues.
arXiv Detail & Related papers (2023-11-15T08:59:02Z) - Combining Decentralized IDentifiers with Proof of Membership to Enable Trust in IoT Networks [44.99833362998488]
The paper proposes and discusses an alternative (mutual) authentication process for IoT nodes under the same administration domain.
The main idea is to combine the Decentralized IDentifier (DID)-based verification of private key ownership with the verification of a proof that the DID belongs to an evolving trusted set.
arXiv Detail & Related papers (2023-10-12T09:33:50Z) - Diff-Privacy: Diffusion-based Face Privacy Protection [58.1021066224765]
In this paper, we propose a novel face privacy protection method based on diffusion models, dubbed Diff-Privacy.
Specifically, we train our proposed multi-scale image inversion module (MSI) to obtain a set of SDM format conditional embeddings of the original image.
Based on the conditional embeddings, we design corresponding embedding scheduling strategies and construct different energy functions during the denoising process to achieve anonymization and visual identity information hiding.
arXiv Detail & Related papers (2023-09-11T09:26:07Z) - User-Centric Health Data Using Self-sovereign Identities [69.50862982117127]
This article presents the potential use of the issuers Self-Sovereign Identities (SSI) and Distributed Ledger Technologies (DLT) to improve the privacy and control of health data.
The paper lists the prominent use cases of decentralized identities in the health area, and discusses an effective blockchain-based architecture.
arXiv Detail & Related papers (2021-07-26T17:09:52Z) - Second layer data governance for permissioned blockchains: the privacy
management challenge [58.720142291102135]
In pandemic situations, such as the COVID-19 and Ebola outbreak, the action related to sharing health data is crucial to avoid the massive infection and decrease the number of deaths.
In this sense, permissioned blockchain technology emerges to empower users to get their rights providing data ownership, transparency, and security through an immutable, unified, and distributed database ruled by smart contracts.
arXiv Detail & Related papers (2020-10-22T13:19:38Z) - Unsupervised Model Personalization while Preserving Privacy and
Scalability: An Open Problem [55.21502268698577]
This work investigates the task of unsupervised model personalization, adapted to continually evolving, unlabeled local user images.
We provide a novel Dual User-Adaptation framework (DUA) to explore the problem.
This framework flexibly disentangles user-adaptation into model personalization on the server and local data regularization on the user device.
arXiv Detail & Related papers (2020-03-30T09:35:12Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.