Blockchain's Transformative Potential in Securing Digital Identities and Personal Data
Downloads
This review paper explores the transformative potential of blockchain technology in securing digital identities and personal data. It examines various blockchain applications, including identity verification, self-sovereign identity, and decentralized authentication mechanisms. Despite scalability issues, interoperability concerns, and regulatory hurdles, ongoing developments promise to overcome these obstacles. Future directions in blockchain technology include scalability solutions, interoperability standards, and privacy-enhancing technologies. Additionally, integration with AI and machine learning presents opportunities for enhancing identity verification processes. Collaboration between industry stakeholders and policymakers is crucial for shaping regulatory frameworks that promote innovation while safeguarding privacy rights. Overall, blockchain technology offers a decentralized and transparent approach to digital identity management and personal data security, with significant implications for empowering individuals and enhancing trust in the digital ecosystem.
Alston, E., Law, W., Murtazashvili, I., & Weiss, M. (2021). Can permissionless blockchains avoid governance and the law? Notre Dame J. on Emerging Tech., 2, 1.
Baier, T., Zirpins, C., & Lamersdorf, W. (2003). Digital identity: How to be someone on the net. Paper presented at the Proceedings of the IADIS International Conference of e-Society.
Beduschi, A. (2019). Digital identity: Contemporary challenges for data protection, privacy and non-discrimination rights. Big Data & Society, 6(2), 2053951719855091.
Beduschi, A., Cinnamon, J., Langford, J., Luo, C., & Owen, D. (2017). Building Digital Identities: The Challenges, Risks and Opportunities of Collecting Behavioural Attributes for new Digital Identity Systems.
Bernabe, J. B., Canovas, J. L., Hernandez-Ramos, J. L., Moreno, R. T., & Skarmeta, A. (2019). Privacy-preserving solutions for blockchain: Review and challenges. IEEE Access, 7, 164908-164940.
Bietti, E. (2019). Consent as a free pass: Platform power and the limits of the informational turn. Pace L. Rev., 40, 310.
Chicano Valenzuela, D. (2022). Identifying and tracking physical objects with hyperledger decentralized applications. Universitat Politècnica de Catalunya,
Chua, H. N., Ooi, J. S., & Herbland, A. (2021). The effects of different personal data categories on information privacy concern and disclosure. Computers & Security, 110, 102453.
Dunphy, P. (2022). A note on the blockchain trilemma for decentralized identity: Learning from experiments with hyperledger indy. arXiv preprint arXiv:2204.05784.
Hammi, M. T., Hammi, B., Bellot, P., & Serhrouchni, A. (2018). Bubbles of Trust: A decentralized blockchain-based authentication system for IoT. Computers & Security, 78, 126-142.
Huang, D., Chung, C.-J., Dong, Q., Luo, J., & Kang, M. (2019). Building private blockchains over public blockchains (PoP) an attribute-based access control approach. Paper presented at the Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing.
Jain, R. (2007). Secure Socket Layer (SSL) and Transport Layer Security (TLS). Washington University, Saint Louis.
Khalid, U., Asim, M., Baker, T., Hung, P. C., Tariq, M. A., & Rafferty, L. (2020). A decentralized lightweight blockchain-based authentication mechanism for IoT systems. Cluster Computing, 23(3), 2067-2087.
Knight, A., & Saxby, S. (2014). Identity crisis: Global challenges of identity protection in a networked world. Computer Law & Security Review, 30(6), 617-632.
Kyriakidou, C. D. N., Papathanasiou, A. M., & Polyzos, G. C. (2023). Decentralized Identity With Applications to Security and Privacy for the Internet of Things. Computer Networks and Communications, 244–271-244–271.
Laurent, M., Denouël, J., Levallois-Barth, C., & Waelbroeck, P. (2015). Digital identity. In Digital identity management (pp. 1-45): Elsevier.
Llamas Covarrubias, J. Z., & Llamas Covarrubias, I. N. (2021). Different types of government and governance in the blockchain. Journal of Governance and Regulation, 10(1).
Luevanos, C., Elizarraras, J., Hirschi, K., & Yeh, J.-h. (2017). Analysis on the security and use of password managers. Paper presented at the 2017 18th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT).
Lux, Z. A., Thatmann, D., Zickau, S., & Beierle, F. (2020). Distributed-ledger-based authentication with decentralized identifiers and verifiable credentials. Paper presented at the 2020 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS).
Mohan, C. (2019). State of public and private blockchains: Myths and reality. Paper presented at the Proceedings of the 2019 international conference on management of data.
Mueller, M. L., Park, Y., Lee, J., & Kim, T.-Y. (2006). Digital identity: How users value the attributes of online identifiers. Information Economics and Policy, 18(4), 405-422.
Myadam, N. G., & Patnam, B. (2020). Design and Implementation of Key Exchange Mechanisms for Software Artifacts using Ocean Protocol. In.
Naik, N., & Jenkins, P. (2021). Sovrin network for decentralized digital identity: Analysing a self-sovereign identity system based on distributed ledger technology. Paper presented at the 2021 IEEE International Symposium on Systems Engineering (ISSE).
Omar, A. S., & Basir, O. (2018). Identity management in IoT networks using blockchain and smart contracts. Paper presented at the 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).
Sullivan, C. (2018). Digital identity–From emergent legal concept to new reality. Computer Law & Security Review, 34(4), 723-731.
Suzor, N. P. (2019). Lawless: The secret rules that govern our digital lives: Cambridge University Press.
Taskinsoy, J. (2019). Blockchain: a misunderstood digital revolution. Things you need to know about blockchain. Things You Need to Know about Blockchain (October 8, 2019).
Tene, O., & Polonetsky, J. (2012). Big data for all: Privacy and user control in the age of analytics. Nw. J. Tech. & Intell. Prop., 11, 239.
Thomas, K., Li, F., Zand, A., Barrett, J., Ranieri, J., Invernizzi, L., . . . Moscicki, A. (2017). Data breaches, phishing, or malware? Understanding the risks of stolen credentials. Paper presented at the Proceedings of the 2017 ACM SIGSAC conference on computer and communications security.
Wang, W., Hoang, D. T., Hu, P., Xiong, Z., Niyato, D., Wang, P., . . . Kim, D. I. (2019). A survey on consensus mechanisms and mining strategy management in blockchain networks. IEEE Access, 7, 22328-22370.
Windley, P. J. (2005). Digital Identity: Unmasking identity management architecture (IMA): " O'Reilly Media, Inc.".
Xu, X., Pautasso, C., Zhu, L., Lu, Q., & Weber, I. (2018). A pattern collection for blockchain-based applications. Paper presented at the Proceedings of the 23rd European Conference on Pattern Languages of Programs.
Zhu, X., & Badr, Y. (2018). Identity management systems for the internet of things: a survey towards blockchain solutions. Sensors, 18(12), 4215.
Zwitter, A. J., Gstrein, O. J., & Yap, E. (2020). Digital identity and the blockchain: universal identity management and the concept of the “Self-Sovereign” individual. Frontiers in Blockchain, 3, 26.