SlideShare a Scribd company logo
1 of 23
Download to read offline
Das E-Government Innovationszentrum ist eine
gemeinsame Einrichtung des BMDW und der TU Graz
Self-Sovereign Identity (SSI)
The Concept of Self-Sovereign Identity (SSI), its motivation and
potential [1]
Andreas Abraham
andreas.abraham@egiz.gv.at
Graz, 06.11.2018
Andreas AbrahamSelf-Sovereign Identity 2
Overview
« What are digital identities
« What is identity management
« What are the problems in identity management
« Can the blockchain help to solve these issues
« Evolution of identity models
« Self-Sovereign Identity
« Architecture, potentital and use cases
« Research
Andreas AbrahamSelf-Sovereign Identity 3
Digital Identities
« “Digital identity can be defined as the digital representation of the information known
about a specific individual or organization.” [Bertino and Takahashi]
« Digital Identity consists of:
« Identifier
« e.g. email address
« Attributes
« e.g. name, birthdate
« Credentials
« e.g. certificate, password
Identifier
Digital Identity
stands for stands for
refers to
Subject
Andreas AbrahamSelf-Sovereign Identity 4
Identity Management (IdM)
« Identity and access management combines processes, technologies, and policies to
manage digital identities and specify how they are used to access resources. [Microsoft]
« Managin of:
« Identities
« Identity lifecycle
« Create
« Usage
« Maintain
« Delete
« Governance
« Access rights
Andreas AbrahamSelf-Sovereign Identity 5
Problems
« The web was not considered using digital identities
« Companies create their own IdM solution -> identity silos
« Problem that the users are not in control of the digital identity and do not have
ownership over the identity data
« Identity silos attract attackers
« Trust in organizations and companies that store and maintain identity data
« Examples:
« The Equifax [2] data breach 2017, sensitive data of approximately 145 million
American citizens were exposed
« Facebook’s [3] data breach 2018, 50 million Facebook profiles were disclosed
Andreas AbrahamSelf-Sovereign Identity 6
Blockchain
« Can the blockchain help to solve these problems?
« What does the term „blockchain“ actually mean?
« The term blockchain can stand for:
« A actual chain of cryptographically connected blocks
« A cryptocurrency
« An umbrella term over a collection of tools and fancy cryptography
« Blockchain is a special case of the DL
« In SSI context, the term distributed ledger (DL) is often used instead of blockchain
It depends!
Andreas AbrahamSelf-Sovereign Identity 7
SSI Concept
« Per definition, sovereignty is a supreme power of authority that governs itself without
any outside influences
« Sovereignty in IdM means that the user fully owns and controls her own identity data
« User should be able to create, update, delete her own identity data
« User has to give consent about what data are being shared
« Joe Andrieu [4] defined the core characteristics of SSI as:
« Control: SSIs are fully controlled by the related subject
« Acceptance: SSIs are accepted were observers and individuals correlate across
contexts
« Zero-Costs: SSIs should follow the minimal cost principle
Andreas AbrahamSelf-Sovereign Identity 8
SSI Concept - The 10 Principles
Christopher Allen [5] defined the 10 principles of SSI
1. Existence
2. Control
3. Access
4. Transparency
5. Persistence
6. Portability
7. Interoperability
8. Consent
9. Minimalization
10. Protection
Andreas AbrahamSelf-Sovereign Identity 9
IdM Actors
« Subject (User)
« Digital identity of a person
« Identity Provider (IdP)
« Identification and authentication
« Provides subjects attributes to SP
« Service Provider (SP)
« Provides services or resources to the subject
« Control Party
« Checks compliance of policies, guidelines and laws
Andreas AbrahamSelf-Sovereign Identity 10
Isolated IdM Model
« SP is also IdP
« Authentication at IdP
« Identity data are stored and maintained
from the SP
[6]
Andreas AbrahamSelf-Sovereign Identity 11
Central IdM Model
« IdP separated from SP
« Identity data are stored at the IdP
« SP receives identity data from the IdP
« User has no control over the actual
data transfer
[6]
Andreas AbrahamSelf-Sovereign Identity 12
Federated IdM Model
« Identity data distributed
across several IdPs
« Identity data are linked
« Trust relationship between
IdPs required
[6]
Andreas AbrahamSelf-Sovereign Identity 13
User-Centric IdM Model
« Identity data are stored in the user‘s
domain
« Sharing of identity data requires
explicit user consent
[6]
Andreas AbrahamSelf-Sovereign Identity 14
SSI IdM Model
« SSI is the next step after the user-centric model
« The user fully controls her identity data
« Without trust in a central authority
« User should be able to create, update and delete their own identity
« Utilizing the distributed ledger technology (DLT)
« Trust is distributed to the nodes
Andreas AbrahamSelf-Sovereign Identity 15
SSI Architecture Requirements
« Ledger Type: Permissioned DL
« Trusted nodes that hold a copy of the ledger
« Consensus mechanism
« Identifier which don‘t require central authority for creation such as decentralized
identifier (DID)
« Lightweight data format that is also extensible such as verifiable claims
« Data storage: No sensitive data are store on the ledger
« Data import/gathering: trust anchors issue claims for users
« Should support selective attribute disclosure
Andreas AbrahamSelf-Sovereign Identity 16
SSI Architecture
Andreas AbrahamSelf-Sovereign Identity 17
SSI Potential
« Extends the trust model in IdM by solving trust issues in a central authority
« Can support GDPR compliance
« Can be used as decentralized public key infrastructure (DPKI)
« No single point of failure
« Not bound to a specific country, usage of identity data all over the world
« Combining it with already existing IdM systems to import identity data
Andreas AbrahamSelf-Sovereign Identity 18
SSI Use Cases
« User applies for a job at company C
« Company C wants to verify if the user holds a masters degree from the university U
« The university issues the user a signed claim that she holds a masters degree
« The user gives her consent to share this claim with company C
« The company can verify that the claim belongs to the User and that the issuer was
the university
Andreas AbrahamSelf-Sovereign Identity 19
SSI Use Cases - Privacy Preserving Claim Attestation
« Requesting special services:
« John is a student with physical disabilities requires special services
« He wants to study at a University and requests these special
« John provides medical attestations, issued by his health operator
« The medical attestations can contain various information about John
« John only discloses the information that he has reduced mobility capabilities
« Prove age of majority:
« John has to prove his age of majority to a public authority
« The public authority receives a claim about that John‘s age is > 18
Andreas AbrahamSelf-Sovereign Identity 20
Research
« Use an existing IdM system as source for digital identities
« Goal is to import identity data from an existing IdM system into a SSI system
« Maintaining the trust in the identity data
« Benefits:
« Possibility to import from almost any existing IdM system
« Without having to change the existing IdM
« Improvement: Privacy-Preserving identity data derivation
Andreas AbrahamSelf-Sovereign Identity 21
Research
[7]
Andreas AbrahamSelf-Sovereign Identity 22
Research
Questions?
Andreas AbrahamSelf-Sovereign Identity 23
References
[1] A. Abraham, „Self-Sovereign Identity“, Whitepaper, https://www.egiz.gv.at/files/download/Self-Sovereign-
Identity-Whitepaper.pdf , 2017
[2] Seena Gressin, “The Equifax Data Breach: What to Do | Consumer Information,” September 8, 2017.
[Online]. Available: https://www.consumer.ftc.gov/blog/2017/09/equifax-data-breach-what-do. [Accessed:
23-Apr-2018].
[3] “Facebook Data Breach -- What To Do Next.” [Online]. Available:
https://www.forbes.com/sites/kateoflahertyuk/2018/09/29/facebook-data-breach-what-to-do-
next/#565bbf9d2de3 . [Accessed: 09-Nov-2018].
[4] J. Andrieu, R. Web, and T. D. October, “A Technology ‐ Free Definition of Self ‐ Sovereign Identity,”
October, 2016.
[5] Allen Christopher, “The Path to Self-Sovereign Identity,” April 25, 2016. [Online]. Available:
http://www.lifewithalacrity.com/2016/04/the-path-to-self-soverereign-identity.html . [Accessed: 30-Aug-
2018].
[6] F. Hörandner, „Lecture Slides Identity Management“, https://teaching.iaik.tugraz.at/_media/egov/2018_19-
l03-identity-management.pdf
[7] A. Abraham, „Importing National eID Attributes into a Decentralized System“, Concept,
https://www.egiz.gv.at/files/projekte/2018/eIdAttributeImport/ImportNationaleEIdAttribute.pdf

More Related Content

What's hot

Blockchain in human resource
Blockchain in human resourceBlockchain in human resource
Blockchain in human resourceCeline George
 
Blockchain Solutions for HR
Blockchain Solutions for HRBlockchain Solutions for HR
Blockchain Solutions for HREdward Lange
 
Identity progress-linked-digital-world
Identity progress-linked-digital-worldIdentity progress-linked-digital-world
Identity progress-linked-digital-worldMEDICI
 
Top 10 companies using blockchain for healthcare security
Top 10 companies using blockchain for healthcare securityTop 10 companies using blockchain for healthcare security
Top 10 companies using blockchain for healthcare securityBlockchain Council
 
The Weakest Point of Security in IoT
The Weakest Point of Security in IoTThe Weakest Point of Security in IoT
The Weakest Point of Security in IoTnsangary
 
Blockchain for Healthcare
Blockchain for HealthcareBlockchain for Healthcare
Blockchain for HealthcareCitiusTech
 
David shrier, weige wu, alex pentland mit blockchain
David shrier, weige wu, alex pentland mit blockchainDavid shrier, weige wu, alex pentland mit blockchain
David shrier, weige wu, alex pentland mit blockchainIT Strategy Group
 
Blockchain in Healthcare
Blockchain in Healthcare Blockchain in Healthcare
Blockchain in Healthcare Alex Tsado
 
Blockchain in Healthcare
Blockchain in HealthcareBlockchain in Healthcare
Blockchain in HealthcareSusan Dart
 
A decentralized consensus application using blockchain ecosystem
A decentralized consensus application using blockchain ecosystem  A decentralized consensus application using blockchain ecosystem
A decentralized consensus application using blockchain ecosystem IJECEIAES
 
Engineering Authority
Engineering AuthorityEngineering Authority
Engineering AuthoritySteve Waldman
 
Central Denmark Region Strengthens Administrative Security with Identity Mana...
Central Denmark Region Strengthens Administrative Security with Identity Mana...Central Denmark Region Strengthens Administrative Security with Identity Mana...
Central Denmark Region Strengthens Administrative Security with Identity Mana...NetIQ
 
Crypto Valley Conference 2019 - CULedger
Crypto Valley Conference 2019 - CULedgerCrypto Valley Conference 2019 - CULedger
Crypto Valley Conference 2019 - CULedgerDarrell O'Donnell
 
CB insights: How Blockchain Technology Could Disrupt Healthcare
CB insights: How Blockchain Technology Could Disrupt HealthcareCB insights: How Blockchain Technology Could Disrupt Healthcare
CB insights: How Blockchain Technology Could Disrupt HealthcareLevi Shapiro
 

What's hot (18)

HR Blockchain User Experience
HR Blockchain User ExperienceHR Blockchain User Experience
HR Blockchain User Experience
 
Domains of Identity
Domains of IdentityDomains of Identity
Domains of Identity
 
Blockchain in human resource
Blockchain in human resourceBlockchain in human resource
Blockchain in human resource
 
Blockchain in HR
Blockchain in HRBlockchain in HR
Blockchain in HR
 
Blockchain Solutions for HR
Blockchain Solutions for HRBlockchain Solutions for HR
Blockchain Solutions for HR
 
Identity progress-linked-digital-world
Identity progress-linked-digital-worldIdentity progress-linked-digital-world
Identity progress-linked-digital-world
 
Top 10 companies using blockchain for healthcare security
Top 10 companies using blockchain for healthcare securityTop 10 companies using blockchain for healthcare security
Top 10 companies using blockchain for healthcare security
 
The Weakest Point of Security in IoT
The Weakest Point of Security in IoTThe Weakest Point of Security in IoT
The Weakest Point of Security in IoT
 
Blockchain for Healthcare
Blockchain for HealthcareBlockchain for Healthcare
Blockchain for Healthcare
 
Sovereign identity
Sovereign identitySovereign identity
Sovereign identity
 
David shrier, weige wu, alex pentland mit blockchain
David shrier, weige wu, alex pentland mit blockchainDavid shrier, weige wu, alex pentland mit blockchain
David shrier, weige wu, alex pentland mit blockchain
 
Blockchain in Healthcare
Blockchain in Healthcare Blockchain in Healthcare
Blockchain in Healthcare
 
Blockchain in Healthcare
Blockchain in HealthcareBlockchain in Healthcare
Blockchain in Healthcare
 
A decentralized consensus application using blockchain ecosystem
A decentralized consensus application using blockchain ecosystem  A decentralized consensus application using blockchain ecosystem
A decentralized consensus application using blockchain ecosystem
 
Engineering Authority
Engineering AuthorityEngineering Authority
Engineering Authority
 
Central Denmark Region Strengthens Administrative Security with Identity Mana...
Central Denmark Region Strengthens Administrative Security with Identity Mana...Central Denmark Region Strengthens Administrative Security with Identity Mana...
Central Denmark Region Strengthens Administrative Security with Identity Mana...
 
Crypto Valley Conference 2019 - CULedger
Crypto Valley Conference 2019 - CULedgerCrypto Valley Conference 2019 - CULedger
Crypto Valley Conference 2019 - CULedger
 
CB insights: How Blockchain Technology Could Disrupt Healthcare
CB insights: How Blockchain Technology Could Disrupt HealthcareCB insights: How Blockchain Technology Could Disrupt Healthcare
CB insights: How Blockchain Technology Could Disrupt Healthcare
 

Similar to BlockchainHub Graz Meetup #24 - Self-Sovereign Identity - Andreas Abraham

Decentralized Identity Solutions: Exploring Top Use Cases and Applications
Decentralized Identity Solutions: Exploring Top Use Cases and ApplicationsDecentralized Identity Solutions: Exploring Top Use Cases and Applications
Decentralized Identity Solutions: Exploring Top Use Cases and ApplicationsAntier School of Blocktech (ASB)
 
Behavioral Big Data & Healthcare Research: Talk at WiDS Taipei
Behavioral Big Data & Healthcare Research: Talk at WiDS TaipeiBehavioral Big Data & Healthcare Research: Talk at WiDS Taipei
Behavioral Big Data & Healthcare Research: Talk at WiDS TaipeiGalit Shmueli
 
Indjic fintech module 3
Indjic fintech module 3Indjic fintech module 3
Indjic fintech module 3Drago Indjic
 
Big Data Ethics Cjbe july 2021
Big Data Ethics Cjbe july 2021Big Data Ethics Cjbe july 2021
Big Data Ethics Cjbe july 2021andygustafson
 
ICT security and Open Data
ICT security and Open DataICT security and Open Data
ICT security and Open DataSecuRing
 
How to Organize Patient Information to Protect Patients' Data
How to Organize Patient Information to Protect Patients' DataHow to Organize Patient Information to Protect Patients' Data
How to Organize Patient Information to Protect Patients' DataHellmuth Broda
 
Keith prabhu global high on cloud summit
Keith prabhu  global high on cloud summitKeith prabhu  global high on cloud summit
Keith prabhu global high on cloud summitadministrator_confidis
 
Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon Kaliya "Identity Woman" Young
 
How To Prevent The World Wild Web Identity Crisis
How To Prevent The World Wild Web Identity CrisisHow To Prevent The World Wild Web Identity Crisis
How To Prevent The World Wild Web Identity Crisiswieringa
 
Privacy Concerns related to Verifiable Claims
Privacy Concerns related to Verifiable ClaimsPrivacy Concerns related to Verifiable Claims
Privacy Concerns related to Verifiable ClaimsDavid Wood
 
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...Kaliya "Identity Woman" Young
 
User-Access Manager: Key to Life Management Platform
User-Access Manager: Key to Life Management PlatformUser-Access Manager: Key to Life Management Platform
User-Access Manager: Key to Life Management PlatformDomenico Catalano
 
Emerging Technologies in Data Sharing and Analytics at Data61
Emerging Technologies in Data Sharing and Analytics at Data61Emerging Technologies in Data Sharing and Analytics at Data61
Emerging Technologies in Data Sharing and Analytics at Data61Liming Zhu
 
Data Con LA 2022 - Pre- recorded - Web3 and Decentralized Identity
Data Con LA 2022 - Pre- recorded - Web3 and Decentralized IdentityData Con LA 2022 - Pre- recorded - Web3 and Decentralized Identity
Data Con LA 2022 - Pre- recorded - Web3 and Decentralized IdentityData Con LA
 
DATA AND AI APPLICATIONS, TOOLS, TECHNOLOGY DIRECTIONS
DATA AND AI APPLICATIONS, TOOLS, TECHNOLOGY DIRECTIONSDATA AND AI APPLICATIONS, TOOLS, TECHNOLOGY DIRECTIONS
DATA AND AI APPLICATIONS, TOOLS, TECHNOLOGY DIRECTIONSIkhlaq Sidhu
 
A Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - FullA Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - Fullgloriakt
 
Protecting Personal Data in a IoT Network with UMA
Protecting Personal Data in a IoT Network with UMAProtecting Personal Data in a IoT Network with UMA
Protecting Personal Data in a IoT Network with UMADomenico Catalano
 
Protecting Personal Data in a IoT Network with UMA
 Protecting Personal Data in a IoT Network with UMA Protecting Personal Data in a IoT Network with UMA
Protecting Personal Data in a IoT Network with UMAkantarainitiative
 
Iot privacy vs convenience
Iot privacy vs  convenienceIot privacy vs  convenience
Iot privacy vs convenienceDon Lovett
 
My Data, My Value: 6 Sense Making Diagrams from the Personal Data Ecosystem.
My Data, My Value: 6 Sense Making Diagrams from the Personal Data Ecosystem.My Data, My Value: 6 Sense Making Diagrams from the Personal Data Ecosystem.
My Data, My Value: 6 Sense Making Diagrams from the Personal Data Ecosystem.Kaliya "Identity Woman" Young
 

Similar to BlockchainHub Graz Meetup #24 - Self-Sovereign Identity - Andreas Abraham (20)

Decentralized Identity Solutions: Exploring Top Use Cases and Applications
Decentralized Identity Solutions: Exploring Top Use Cases and ApplicationsDecentralized Identity Solutions: Exploring Top Use Cases and Applications
Decentralized Identity Solutions: Exploring Top Use Cases and Applications
 
Behavioral Big Data & Healthcare Research: Talk at WiDS Taipei
Behavioral Big Data & Healthcare Research: Talk at WiDS TaipeiBehavioral Big Data & Healthcare Research: Talk at WiDS Taipei
Behavioral Big Data & Healthcare Research: Talk at WiDS Taipei
 
Indjic fintech module 3
Indjic fintech module 3Indjic fintech module 3
Indjic fintech module 3
 
Big Data Ethics Cjbe july 2021
Big Data Ethics Cjbe july 2021Big Data Ethics Cjbe july 2021
Big Data Ethics Cjbe july 2021
 
ICT security and Open Data
ICT security and Open DataICT security and Open Data
ICT security and Open Data
 
How to Organize Patient Information to Protect Patients' Data
How to Organize Patient Information to Protect Patients' DataHow to Organize Patient Information to Protect Patients' Data
How to Organize Patient Information to Protect Patients' Data
 
Keith prabhu global high on cloud summit
Keith prabhu  global high on cloud summitKeith prabhu  global high on cloud summit
Keith prabhu global high on cloud summit
 
Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon
 
How To Prevent The World Wild Web Identity Crisis
How To Prevent The World Wild Web Identity CrisisHow To Prevent The World Wild Web Identity Crisis
How To Prevent The World Wild Web Identity Crisis
 
Privacy Concerns related to Verifiable Claims
Privacy Concerns related to Verifiable ClaimsPrivacy Concerns related to Verifiable Claims
Privacy Concerns related to Verifiable Claims
 
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
 
User-Access Manager: Key to Life Management Platform
User-Access Manager: Key to Life Management PlatformUser-Access Manager: Key to Life Management Platform
User-Access Manager: Key to Life Management Platform
 
Emerging Technologies in Data Sharing and Analytics at Data61
Emerging Technologies in Data Sharing and Analytics at Data61Emerging Technologies in Data Sharing and Analytics at Data61
Emerging Technologies in Data Sharing and Analytics at Data61
 
Data Con LA 2022 - Pre- recorded - Web3 and Decentralized Identity
Data Con LA 2022 - Pre- recorded - Web3 and Decentralized IdentityData Con LA 2022 - Pre- recorded - Web3 and Decentralized Identity
Data Con LA 2022 - Pre- recorded - Web3 and Decentralized Identity
 
DATA AND AI APPLICATIONS, TOOLS, TECHNOLOGY DIRECTIONS
DATA AND AI APPLICATIONS, TOOLS, TECHNOLOGY DIRECTIONSDATA AND AI APPLICATIONS, TOOLS, TECHNOLOGY DIRECTIONS
DATA AND AI APPLICATIONS, TOOLS, TECHNOLOGY DIRECTIONS
 
A Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - FullA Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - Full
 
Protecting Personal Data in a IoT Network with UMA
Protecting Personal Data in a IoT Network with UMAProtecting Personal Data in a IoT Network with UMA
Protecting Personal Data in a IoT Network with UMA
 
Protecting Personal Data in a IoT Network with UMA
 Protecting Personal Data in a IoT Network with UMA Protecting Personal Data in a IoT Network with UMA
Protecting Personal Data in a IoT Network with UMA
 
Iot privacy vs convenience
Iot privacy vs  convenienceIot privacy vs  convenience
Iot privacy vs convenience
 
My Data, My Value: 6 Sense Making Diagrams from the Personal Data Ecosystem.
My Data, My Value: 6 Sense Making Diagrams from the Personal Data Ecosystem.My Data, My Value: 6 Sense Making Diagrams from the Personal Data Ecosystem.
My Data, My Value: 6 Sense Making Diagrams from the Personal Data Ecosystem.
 

More from BlockchainHub Graz

BlockchainHub Graz Meetup #27 - Krypto-Assets & Steuern - Natalie Enzinger
BlockchainHub Graz Meetup #27 - Krypto-Assets & Steuern - Natalie EnzingerBlockchainHub Graz Meetup #27 - Krypto-Assets & Steuern - Natalie Enzinger
BlockchainHub Graz Meetup #27 - Krypto-Assets & Steuern - Natalie EnzingerBlockchainHub Graz
 
BlockchainHub Graz Meetup #25 - ELASTOS - Semir Ramovic
BlockchainHub Graz Meetup #25 - ELASTOS - Semir RamovicBlockchainHub Graz Meetup #25 - ELASTOS - Semir Ramovic
BlockchainHub Graz Meetup #25 - ELASTOS - Semir RamovicBlockchainHub Graz
 
BlockchainHub Graz Meetup #23 - State Channels - Ralph Pichler
BlockchainHub Graz Meetup #23 - State Channels - Ralph PichlerBlockchainHub Graz Meetup #23 - State Channels - Ralph Pichler
BlockchainHub Graz Meetup #23 - State Channels - Ralph PichlerBlockchainHub Graz
 
BlockchainHub Graz Meetup #22 - Atomic Swaps - Johannes Zweng
BlockchainHub Graz Meetup #22 - Atomic Swaps - Johannes ZwengBlockchainHub Graz Meetup #22 - Atomic Swaps - Johannes Zweng
BlockchainHub Graz Meetup #22 - Atomic Swaps - Johannes ZwengBlockchainHub Graz
 
BCHGraz - Meetup #16 - Blockchain Real Life Usecases - Dr. Peter Teufl
BCHGraz - Meetup #16 - Blockchain Real Life Usecases - Dr. Peter TeuflBCHGraz - Meetup #16 - Blockchain Real Life Usecases - Dr. Peter Teufl
BCHGraz - Meetup #16 - Blockchain Real Life Usecases - Dr. Peter TeuflBlockchainHub Graz
 
BCHGraz - Meetup #15 - Blockchain in Real Estate - Walter Strametz
BCHGraz - Meetup #15 - Blockchain in Real Estate - Walter StrametzBCHGraz - Meetup #15 - Blockchain in Real Estate - Walter Strametz
BCHGraz - Meetup #15 - Blockchain in Real Estate - Walter StrametzBlockchainHub Graz
 
BCHGraz - Meetup #14 - Seratio Token - Prof. Olinga Ta'eed
BCHGraz - Meetup #14 - Seratio Token - Prof. Olinga Ta'eedBCHGraz - Meetup #14 - Seratio Token - Prof. Olinga Ta'eed
BCHGraz - Meetup #14 - Seratio Token - Prof. Olinga Ta'eedBlockchainHub Graz
 
BCHGraz - Meetup #12 - ICO Rechtliche Grundlagen - Oliver Völkel
BCHGraz - Meetup #12 - ICO Rechtliche Grundlagen - Oliver VölkelBCHGraz - Meetup #12 - ICO Rechtliche Grundlagen - Oliver Völkel
BCHGraz - Meetup #12 - ICO Rechtliche Grundlagen - Oliver VölkelBlockchainHub Graz
 
BCHGraz - Meetup #12 - ICO Basics
BCHGraz - Meetup #12 - ICO BasicsBCHGraz - Meetup #12 - ICO Basics
BCHGraz - Meetup #12 - ICO BasicsBlockchainHub Graz
 
BCHGraz - Meetup #11 - Bitsquare DAO by Manfred Karrer
BCHGraz - Meetup #11 - Bitsquare DAO by Manfred KarrerBCHGraz - Meetup #11 - Bitsquare DAO by Manfred Karrer
BCHGraz - Meetup #11 - Bitsquare DAO by Manfred KarrerBlockchainHub Graz
 
BCHGraz - Meetup #10 - DASH (digital cash) by Valentin Kalinov
BCHGraz - Meetup #10 - DASH (digital cash) by Valentin KalinovBCHGraz - Meetup #10 - DASH (digital cash) by Valentin Kalinov
BCHGraz - Meetup #10 - DASH (digital cash) by Valentin KalinovBlockchainHub Graz
 
BCHGraz - Meetup #9 - Monero by Justin Ehrenhofer
BCHGraz - Meetup #9 - Monero by Justin EhrenhoferBCHGraz - Meetup #9 - Monero by Justin Ehrenhofer
BCHGraz - Meetup #9 - Monero by Justin EhrenhoferBlockchainHub Graz
 
BCHGraz - Meetup #8 - Intro & Ethereum
 BCHGraz - Meetup #8 - Intro & Ethereum BCHGraz - Meetup #8 - Intro & Ethereum
BCHGraz - Meetup #8 - Intro & EthereumBlockchainHub Graz
 
Blockchain Coding Dojo - BlockchainHub Graz
Blockchain Coding Dojo - BlockchainHub GrazBlockchain Coding Dojo - BlockchainHub Graz
Blockchain Coding Dojo - BlockchainHub GrazBlockchainHub Graz
 
Ripple - the good, the bad and the ugly
Ripple - the good, the bad and the uglyRipple - the good, the bad and the ugly
Ripple - the good, the bad and the uglyBlockchainHub Graz
 
BCHGraz - NEM Blockchain Tech - Intro
BCHGraz - NEM Blockchain Tech - IntroBCHGraz - NEM Blockchain Tech - Intro
BCHGraz - NEM Blockchain Tech - IntroBlockchainHub Graz
 
BCHGraz - Apostille - NEM Blockchain Tech
BCHGraz - Apostille - NEM Blockchain Tech BCHGraz - Apostille - NEM Blockchain Tech
BCHGraz - Apostille - NEM Blockchain Tech BlockchainHub Graz
 
IOTA Presentation - BlockchainHub Graz Meetup #5
IOTA Presentation - BlockchainHub Graz Meetup #5 IOTA Presentation - BlockchainHub Graz Meetup #5
IOTA Presentation - BlockchainHub Graz Meetup #5 BlockchainHub Graz
 
RSK (Rootstock) - Smarter Bitcoin
RSK (Rootstock) - Smarter BitcoinRSK (Rootstock) - Smarter Bitcoin
RSK (Rootstock) - Smarter BitcoinBlockchainHub Graz
 

More from BlockchainHub Graz (20)

BlockchainHub Graz Meetup #27 - Krypto-Assets & Steuern - Natalie Enzinger
BlockchainHub Graz Meetup #27 - Krypto-Assets & Steuern - Natalie EnzingerBlockchainHub Graz Meetup #27 - Krypto-Assets & Steuern - Natalie Enzinger
BlockchainHub Graz Meetup #27 - Krypto-Assets & Steuern - Natalie Enzinger
 
BlockchainHub Graz Meetup #25 - ELASTOS - Semir Ramovic
BlockchainHub Graz Meetup #25 - ELASTOS - Semir RamovicBlockchainHub Graz Meetup #25 - ELASTOS - Semir Ramovic
BlockchainHub Graz Meetup #25 - ELASTOS - Semir Ramovic
 
BlockchainHub Graz Meetup #23 - State Channels - Ralph Pichler
BlockchainHub Graz Meetup #23 - State Channels - Ralph PichlerBlockchainHub Graz Meetup #23 - State Channels - Ralph Pichler
BlockchainHub Graz Meetup #23 - State Channels - Ralph Pichler
 
BlockchainHub Graz Meetup #22 - Atomic Swaps - Johannes Zweng
BlockchainHub Graz Meetup #22 - Atomic Swaps - Johannes ZwengBlockchainHub Graz Meetup #22 - Atomic Swaps - Johannes Zweng
BlockchainHub Graz Meetup #22 - Atomic Swaps - Johannes Zweng
 
BCHGraz - Meetup #16 - Blockchain Real Life Usecases - Dr. Peter Teufl
BCHGraz - Meetup #16 - Blockchain Real Life Usecases - Dr. Peter TeuflBCHGraz - Meetup #16 - Blockchain Real Life Usecases - Dr. Peter Teufl
BCHGraz - Meetup #16 - Blockchain Real Life Usecases - Dr. Peter Teufl
 
BCHGraz - Meetup #15 - Blockchain in Real Estate - Walter Strametz
BCHGraz - Meetup #15 - Blockchain in Real Estate - Walter StrametzBCHGraz - Meetup #15 - Blockchain in Real Estate - Walter Strametz
BCHGraz - Meetup #15 - Blockchain in Real Estate - Walter Strametz
 
BCHGraz - Meetup #14 - Seratio Token - Prof. Olinga Ta'eed
BCHGraz - Meetup #14 - Seratio Token - Prof. Olinga Ta'eedBCHGraz - Meetup #14 - Seratio Token - Prof. Olinga Ta'eed
BCHGraz - Meetup #14 - Seratio Token - Prof. Olinga Ta'eed
 
BCHGraz - Meetup #12 - ICO Rechtliche Grundlagen - Oliver Völkel
BCHGraz - Meetup #12 - ICO Rechtliche Grundlagen - Oliver VölkelBCHGraz - Meetup #12 - ICO Rechtliche Grundlagen - Oliver Völkel
BCHGraz - Meetup #12 - ICO Rechtliche Grundlagen - Oliver Völkel
 
BCHGraz - Meetup #12 - ICO Basics
BCHGraz - Meetup #12 - ICO BasicsBCHGraz - Meetup #12 - ICO Basics
BCHGraz - Meetup #12 - ICO Basics
 
BCHGraz - Meetup #11 - Bitsquare DAO by Manfred Karrer
BCHGraz - Meetup #11 - Bitsquare DAO by Manfred KarrerBCHGraz - Meetup #11 - Bitsquare DAO by Manfred Karrer
BCHGraz - Meetup #11 - Bitsquare DAO by Manfred Karrer
 
BCHGraz - Meetup #10 - DASH (digital cash) by Valentin Kalinov
BCHGraz - Meetup #10 - DASH (digital cash) by Valentin KalinovBCHGraz - Meetup #10 - DASH (digital cash) by Valentin Kalinov
BCHGraz - Meetup #10 - DASH (digital cash) by Valentin Kalinov
 
BCHGraz - Meetup #9 - Monero by Justin Ehrenhofer
BCHGraz - Meetup #9 - Monero by Justin EhrenhoferBCHGraz - Meetup #9 - Monero by Justin Ehrenhofer
BCHGraz - Meetup #9 - Monero by Justin Ehrenhofer
 
BCHGraz - Meetup #8 - Intro & Ethereum
 BCHGraz - Meetup #8 - Intro & Ethereum BCHGraz - Meetup #8 - Intro & Ethereum
BCHGraz - Meetup #8 - Intro & Ethereum
 
Blockchain Coding Dojo - BlockchainHub Graz
Blockchain Coding Dojo - BlockchainHub GrazBlockchain Coding Dojo - BlockchainHub Graz
Blockchain Coding Dojo - BlockchainHub Graz
 
BCHGraz - Meetup #7 - Intro
BCHGraz - Meetup #7 - IntroBCHGraz - Meetup #7 - Intro
BCHGraz - Meetup #7 - Intro
 
Ripple - the good, the bad and the ugly
Ripple - the good, the bad and the uglyRipple - the good, the bad and the ugly
Ripple - the good, the bad and the ugly
 
BCHGraz - NEM Blockchain Tech - Intro
BCHGraz - NEM Blockchain Tech - IntroBCHGraz - NEM Blockchain Tech - Intro
BCHGraz - NEM Blockchain Tech - Intro
 
BCHGraz - Apostille - NEM Blockchain Tech
BCHGraz - Apostille - NEM Blockchain Tech BCHGraz - Apostille - NEM Blockchain Tech
BCHGraz - Apostille - NEM Blockchain Tech
 
IOTA Presentation - BlockchainHub Graz Meetup #5
IOTA Presentation - BlockchainHub Graz Meetup #5 IOTA Presentation - BlockchainHub Graz Meetup #5
IOTA Presentation - BlockchainHub Graz Meetup #5
 
RSK (Rootstock) - Smarter Bitcoin
RSK (Rootstock) - Smarter BitcoinRSK (Rootstock) - Smarter Bitcoin
RSK (Rootstock) - Smarter Bitcoin
 

Recently uploaded

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 

Recently uploaded (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

BlockchainHub Graz Meetup #24 - Self-Sovereign Identity - Andreas Abraham

  • 1. Das E-Government Innovationszentrum ist eine gemeinsame Einrichtung des BMDW und der TU Graz Self-Sovereign Identity (SSI) The Concept of Self-Sovereign Identity (SSI), its motivation and potential [1] Andreas Abraham andreas.abraham@egiz.gv.at Graz, 06.11.2018
  • 2. Andreas AbrahamSelf-Sovereign Identity 2 Overview « What are digital identities « What is identity management « What are the problems in identity management « Can the blockchain help to solve these issues « Evolution of identity models « Self-Sovereign Identity « Architecture, potentital and use cases « Research
  • 3. Andreas AbrahamSelf-Sovereign Identity 3 Digital Identities « “Digital identity can be defined as the digital representation of the information known about a specific individual or organization.” [Bertino and Takahashi] « Digital Identity consists of: « Identifier « e.g. email address « Attributes « e.g. name, birthdate « Credentials « e.g. certificate, password Identifier Digital Identity stands for stands for refers to Subject
  • 4. Andreas AbrahamSelf-Sovereign Identity 4 Identity Management (IdM) « Identity and access management combines processes, technologies, and policies to manage digital identities and specify how they are used to access resources. [Microsoft] « Managin of: « Identities « Identity lifecycle « Create « Usage « Maintain « Delete « Governance « Access rights
  • 5. Andreas AbrahamSelf-Sovereign Identity 5 Problems « The web was not considered using digital identities « Companies create their own IdM solution -> identity silos « Problem that the users are not in control of the digital identity and do not have ownership over the identity data « Identity silos attract attackers « Trust in organizations and companies that store and maintain identity data « Examples: « The Equifax [2] data breach 2017, sensitive data of approximately 145 million American citizens were exposed « Facebook’s [3] data breach 2018, 50 million Facebook profiles were disclosed
  • 6. Andreas AbrahamSelf-Sovereign Identity 6 Blockchain « Can the blockchain help to solve these problems? « What does the term „blockchain“ actually mean? « The term blockchain can stand for: « A actual chain of cryptographically connected blocks « A cryptocurrency « An umbrella term over a collection of tools and fancy cryptography « Blockchain is a special case of the DL « In SSI context, the term distributed ledger (DL) is often used instead of blockchain It depends!
  • 7. Andreas AbrahamSelf-Sovereign Identity 7 SSI Concept « Per definition, sovereignty is a supreme power of authority that governs itself without any outside influences « Sovereignty in IdM means that the user fully owns and controls her own identity data « User should be able to create, update, delete her own identity data « User has to give consent about what data are being shared « Joe Andrieu [4] defined the core characteristics of SSI as: « Control: SSIs are fully controlled by the related subject « Acceptance: SSIs are accepted were observers and individuals correlate across contexts « Zero-Costs: SSIs should follow the minimal cost principle
  • 8. Andreas AbrahamSelf-Sovereign Identity 8 SSI Concept - The 10 Principles Christopher Allen [5] defined the 10 principles of SSI 1. Existence 2. Control 3. Access 4. Transparency 5. Persistence 6. Portability 7. Interoperability 8. Consent 9. Minimalization 10. Protection
  • 9. Andreas AbrahamSelf-Sovereign Identity 9 IdM Actors « Subject (User) « Digital identity of a person « Identity Provider (IdP) « Identification and authentication « Provides subjects attributes to SP « Service Provider (SP) « Provides services or resources to the subject « Control Party « Checks compliance of policies, guidelines and laws
  • 10. Andreas AbrahamSelf-Sovereign Identity 10 Isolated IdM Model « SP is also IdP « Authentication at IdP « Identity data are stored and maintained from the SP [6]
  • 11. Andreas AbrahamSelf-Sovereign Identity 11 Central IdM Model « IdP separated from SP « Identity data are stored at the IdP « SP receives identity data from the IdP « User has no control over the actual data transfer [6]
  • 12. Andreas AbrahamSelf-Sovereign Identity 12 Federated IdM Model « Identity data distributed across several IdPs « Identity data are linked « Trust relationship between IdPs required [6]
  • 13. Andreas AbrahamSelf-Sovereign Identity 13 User-Centric IdM Model « Identity data are stored in the user‘s domain « Sharing of identity data requires explicit user consent [6]
  • 14. Andreas AbrahamSelf-Sovereign Identity 14 SSI IdM Model « SSI is the next step after the user-centric model « The user fully controls her identity data « Without trust in a central authority « User should be able to create, update and delete their own identity « Utilizing the distributed ledger technology (DLT) « Trust is distributed to the nodes
  • 15. Andreas AbrahamSelf-Sovereign Identity 15 SSI Architecture Requirements « Ledger Type: Permissioned DL « Trusted nodes that hold a copy of the ledger « Consensus mechanism « Identifier which don‘t require central authority for creation such as decentralized identifier (DID) « Lightweight data format that is also extensible such as verifiable claims « Data storage: No sensitive data are store on the ledger « Data import/gathering: trust anchors issue claims for users « Should support selective attribute disclosure
  • 17. Andreas AbrahamSelf-Sovereign Identity 17 SSI Potential « Extends the trust model in IdM by solving trust issues in a central authority « Can support GDPR compliance « Can be used as decentralized public key infrastructure (DPKI) « No single point of failure « Not bound to a specific country, usage of identity data all over the world « Combining it with already existing IdM systems to import identity data
  • 18. Andreas AbrahamSelf-Sovereign Identity 18 SSI Use Cases « User applies for a job at company C « Company C wants to verify if the user holds a masters degree from the university U « The university issues the user a signed claim that she holds a masters degree « The user gives her consent to share this claim with company C « The company can verify that the claim belongs to the User and that the issuer was the university
  • 19. Andreas AbrahamSelf-Sovereign Identity 19 SSI Use Cases - Privacy Preserving Claim Attestation « Requesting special services: « John is a student with physical disabilities requires special services « He wants to study at a University and requests these special « John provides medical attestations, issued by his health operator « The medical attestations can contain various information about John « John only discloses the information that he has reduced mobility capabilities « Prove age of majority: « John has to prove his age of majority to a public authority « The public authority receives a claim about that John‘s age is > 18
  • 20. Andreas AbrahamSelf-Sovereign Identity 20 Research « Use an existing IdM system as source for digital identities « Goal is to import identity data from an existing IdM system into a SSI system « Maintaining the trust in the identity data « Benefits: « Possibility to import from almost any existing IdM system « Without having to change the existing IdM « Improvement: Privacy-Preserving identity data derivation
  • 22. Andreas AbrahamSelf-Sovereign Identity 22 Research Questions?
  • 23. Andreas AbrahamSelf-Sovereign Identity 23 References [1] A. Abraham, „Self-Sovereign Identity“, Whitepaper, https://www.egiz.gv.at/files/download/Self-Sovereign- Identity-Whitepaper.pdf , 2017 [2] Seena Gressin, “The Equifax Data Breach: What to Do | Consumer Information,” September 8, 2017. [Online]. Available: https://www.consumer.ftc.gov/blog/2017/09/equifax-data-breach-what-do. [Accessed: 23-Apr-2018]. [3] “Facebook Data Breach -- What To Do Next.” [Online]. Available: https://www.forbes.com/sites/kateoflahertyuk/2018/09/29/facebook-data-breach-what-to-do- next/#565bbf9d2de3 . [Accessed: 09-Nov-2018]. [4] J. Andrieu, R. Web, and T. D. October, “A Technology ‐ Free Definition of Self ‐ Sovereign Identity,” October, 2016. [5] Allen Christopher, “The Path to Self-Sovereign Identity,” April 25, 2016. [Online]. Available: http://www.lifewithalacrity.com/2016/04/the-path-to-self-soverereign-identity.html . [Accessed: 30-Aug- 2018]. [6] F. Hörandner, „Lecture Slides Identity Management“, https://teaching.iaik.tugraz.at/_media/egov/2018_19- l03-identity-management.pdf [7] A. Abraham, „Importing National eID Attributes into a Decentralized System“, Concept, https://www.egiz.gv.at/files/projekte/2018/eIdAttributeImport/ImportNationaleEIdAttribute.pdf