Decentralized ID and Self-Sovereign Identity Solutions Using Bloc
Decentralized ID and Self-Sovereign Identity Solutions Using Bloc
Abstract
Today users do not have control over their digital identities. To access and validate them, they
must authenticate through a third party which they must trust. This is a problem that researchers
have addressed with the blooming of new paradigms such as Decentralized Identifiers (DIDs)
and Self-Sovereign Identity (SSI). In this context, blockchain appears as a new path that ensures
traceability to all transactions. Although there are several primary studies related to this topic,
there needs to be more contributions that condense all the information of research groups in a
secondary study, which summarizes the techniques and trends of DIDs and SSI. Therefore, this
paper presents a systematic literature review to identify research trends, challenges, and solu-
tions to DID and SSI using blockchain. Twenty-three papers published from 2014 to October
2022 were selected following inclusion and exclusion criteria. The investigation points out how
most DIDs and SSI solutions are set in the general domain as academic postulations that could
be released in the commercial field.
Keywords: decentralized ID, self-sovereign, DID, SSI, blockchain
1. Introduction
Within a world where subjects have started to lose trust in centralized models that look depre-
cated and have lost effectiveness, concepts such as Decentralized Identifiers (DIDs) and Self-
Sovereign Identity (SSI) have gained a role play in the security field. This is because DIDs and
SSI relate payloads with a subject after verification processes without any intermediary actor
like the government. Similarly, blockchain has appeared as a new path to transparency with its
non-repudiation features that ensure traceability to all transactions. Therefore, it is unsurprising
that DIDs and SSI solutions have adopted implementations over blockchain technologies. Thus,
it is a fact that DIDs and SSI are proximate topics, so often taken as equals, that the differences
between them could be shown as merely conceptual and with many research opportunities and
CEDILLO ET AL . D ECENTRALIZED ID AND S ELF -S OVEREIGN I DENTITY S OLUTIONS ...
challenges that need to be taken. In this paper, we conducted a systematic literature review
to identify research trends and challenges to DIDs and SSI blockchain-based solutions while
searching for gaps in the field that can serve as a starting point for further research.
A systematic review identifies, analyzes, and interprets unbiasedly all the evidence on a spe-
cific topic presented in relevant primary studies; it uses a structured approach to minimize bias
and maximize objectivity [5]. Several primary studies have been carried out in this context, but
the information that provides insights to researchers is scattered in several digital libraries and
databases. Besides, there are no secondary studies that perform a summary of the research state
in this field. Then, it is necessary to have a study that joins all the information in a systematic
review that shows research gaps and the proposed solutions condensed.
We obtained twenty-three papers collected in the digital libraries ACM, IEEE Xplore and
Springer Link, which were selected after applying the inclusion and exclusion criteria.
The remainder of this paper is structured as follows. Section 2 outlines general concepts of
DIDs and SSI, including a discussion about existing systematic literature reviews in the field.
The research methodology is described in Section 3, and individual results are presented in
Section 4. Section 5 discusses the relevance and contributions of the systematic literature review.
A validation of the systematic review is presented in Section 6. and last but not least, Section 7
presents conclusions and future work.
2. Background
This section explains concepts related to DIDs, SSI, and blockchain technologies to readers so
they can understand the field where this investigation occurred.
Decentralized ID
According to Sporny et al. [12], Decentralized Identifiers (DIDs) are a new class of subject
identifiers that enable verifiable decentralized digital identities. A subject can be a person, orga-
nization, thing, or data model. Unlike typical federated identifiers, DIDs can be decoupled from
centralized registries, identity providers, and certificate authorities. DIDs are Uniform Resource
Identifiers (URIs) that associate a DID subject with a DID document, allowing reliable inter-
action with a subject; they are designed to enable individuals and organizations to use systems
they trust to generate their credentials.
Self-Sovereign Identity
Related to Self-Sovereign, a subject that owns more than one DID can present claims or
related credentials without needing an intermediary. Then, Self-Sovereign does not allow in-
dividuals or organizations to control all aspects of their identity that are provided by external
parties such as, for example, the government [14].
Blockchain Technology
Blockchain is a shared and unalterable ledger that facilitates the process of recording trans-
actions and tracking tangible or intangible assets in a business network. It is a distributed ledger
technology to which all network participants have access. Furthermore, it is distinguished for
its unalterable transaction log; thus, transactions are recorded only once, guaranteeing no one
can modify them [15].
Existing systematic reviews for DID and SSI
Several searches were conducted in the IEEE Xplore, ScienceDirect, and ACM Digital Li-
brary to establish the existence of other systematic reviews related to that presented in this paper.
The following search string was used: (decentrali* OR self-sovereign OR self sovereign) AND
(id OR identi*) AND (blockchain OR block chain OR block-chain) AND (systematic) AND (re-
view). However, only two results were found: an SSI systematic and mapping review [9] in
2021 and a DID and SSI mapping review [11] in 2020.
The nearest study to our systematic review is [11]; however, as it is a systematic mapping,
the authors are centered on classifying studies without a deep understanding and analysis of each
ISD2023 L ISBON , P ORTUGAL
one. On the other hand, the study presented in [9] analyzes theoretical and practical advances
in Self-Sovereign Identity. This work proposes different extraction criteria from our review;
its main criteria seek to examine: i) what practical problems associated with SSI have been
introduced and solved, ii) How SSI is formally specified, and iii) what concept/idea is introduced
or refused.
Schardong and Custódio [9] have systematically mapped and classified theoretical and prac-
tical advances in Self-Sovereign Identity, including both peer-reviewed and non-peer-reviewed
literature that expanded the conceptual discussion on what SSI is. Also, it introduced mathemat-
ical formulation to define SSI-related problems, presented a novel pragmatic problem related to
the SSI ecosystem, and presented a solution to it. Čučko and Turkanovi [11] published a map-
ping review analyzing 120 research papers concerning six criteria: i) contribution, ii) domain,
iii) IT Field, iv) research type, v) research method, and vi) place of publication. The results
show that research in the DIDs and SSI field had increased by 96.7 % from 2017 to 2021.
In the literature, it has been found several secondary studies (not systematic or mapping
literature reviews) released in the DID and SSI field, including or not blockchain as their imple-
mentation technology. Some of these studies are detailed below.
Gilani et al. [4] provide an overview of challenges, research gaps, and trade-offs of the cur-
rent state of the art on privacy-preserving solutions in decentralized systems using blockchain;
that paper shows central concepts of SSI, including the components of identity proofing and
authentication solutions for different solutions such as uPort, Blockstack, SelfKey, Civic, and
Shocard. Bartolomeu et al. [1] reduce the scope and discuss SSI’s use cases, technologies, and
challenges in the IoT field; this study also analyzes some popular self-sovereign identity frame-
works: Hyperledger Indy, uPort, Blockstack, Veres One, and Jocolom, comparing them respect-
ing seven characteristics: main goal, development, verifiable credentials, distributed ledger,
transactions per second, transaction delay, and transaction cost. Every mentioned framework
leverages blockchain technology. Kuperberg [6] has surveyed a wide array of blockchain-based
solutions providing an evaluation framework for decentralized and SSI management systems;
it included an extensive set of requirements covering ecosystem aspects, end-user functional-
ity, mobility and overhead aspects, compliance/liability, EU regulations, standardization, and
integration.
In contrast to [1], our review includes papers about DID and SSI fields. Also, our study
is diverse from [6] as our focus is the domain incursion and solutions trends in those domains
while considering security assets (access control policies, authentication method, and encryption
type). Finally, at this final issue, our investigation differs from [4] because our scope is broader;
both SSI and DID solutions are covered and include applications, architectures, prototypes,
schemes, and frameworks, while [4] only analyzes commercial applications associated with
SSI.
3. Research Method
A systematic review is developed using a rigorous, reliable, repetitive, and extended methodol-
ogy. This review follows the steps presented by Kitchenham methodology [5]: i) planning the
review, ii) conducting the review, and iii) reporting the review.
primary studies, establish the strategy for extracting the information, and define the synthesis
strategy.
To meet the review’s objectives, this review answers the following research questions:
RQ1: Which IT fields have had Decentralized ID or Self-Sovereign Identity solutions?
RQ2: Which tools addressing Decentralized ID or Self-Sovereign Identity are there in the
academy?
RQ3: Which security challenges have been addressed in Decentralized ID or Self-Sovereign
solutions Identity?
• Criterion 1: Information Technology(IT) field. This and the second criterion indicate
the current scope of the academic solutions to DIDs and SSI using blockchain. This cri-
terion classifies the solutions in one of nine IT fields adopting the classification proposed
in [11]: IoT, Security, Privacy, Trust, User Experience (UX) and Usability, Patterns, IT
Architecture, Decentralized Public-Key Infrastructure (DPKI).
ISD2023 L ISBON , P ORTUGAL
• Criterion 2: Domain. The solutions were classified using the suggested domains in [11]:
Education, Government, Health care, Retail and eCommerce, Banking and Financial, In-
dustry, Supply chain, Transport, General, and Others.
• Criterion 3: Blockchain Type. To discover which types of blockchain is used to apply
each solution, it was established the following classification: Public, Hybrid, Consortium,
and Private.
• Criterion 4: Software pricing. This criterion identifies whether the application has any
monetary cost to the user. There are three categories: i) Free, ii) Paid and iii) Test phase
(if the product is in the testing phase or is a prototype).
• Criteria 5: Solutions and Application. Solutions and Applications can be divided ac-
cording to their nature into Architecture, App, Methodology, Prototype, and Others [2].
Garnica-Bautista et al. [3] consider three primary types of applications: Website, Desktop
and Mobile Application; all papers with this kind of solutions are included in the category
App.
• Criterion 6: Control Access Model. This criterion determines the approach to applying
policies and deciding on resource access. Stalling and Brown [13] present some models:
Attributes-Based Access Control (ABAC), Role Based Access Control (RDAC), Manda-
tory Access Control (MAC), and Discretionary Access Control (DAC).
• Criterion 7: Authentication method. This criterion refers to the process carried out by
a user to access a system or resource, according to [13] the authentication methods are:
Password-based, Token-based, Biometric Authentication, and Remote User.
• Criterion 8: Cryptographic algorithms. If a solution or infrastructure has a tool us-
ing symmetric encryption algorithms, it is classified as private key; otherwise, if it uses
asymmetric encryption it is a public key.
Primary studies
23
domain (S01, S02, S04, S06, S07, S08, S10, S11, S12, S13, S14, S18, S20, S21, S22);
the remaining domains present a gap that could be assessed.
• Criterion 4. Software pricing. Most of the reviewed papers were categorized within the
“test phase” because they are architectures, frameworks or schemes that can be used to
generate a solution (S02, S03, S04, S05, S07, S09, S10, S12, S13, S15, S17, S18, S19,
S20, S21, S22, S23). No applications have been presented in a paid way to the public; we
found that only one tool called "uPor" has been freely available to the public (S08). It is
an open-source identity management system oriented to common people or organizations,
users can securely publish their identity, transfer their credentials, sign transactions and
control their keys and data. It could be used as a web application on desktop and mobile
platforms.
• Criterion 5. Solutions and applications. The results indicate that little over half of the
solutions were implemented in the “Others” category, in this group are systems, schemas,
protocols and frameworks (65%; S01, S03, S04, S06, S07, S11, S12, S13, S14, S16, S18,
S20, S21, S22, S23).
• Criterion 6. Access control models. The results indicate that 26% of the solutions have
not considered or discussed access control when proposing their solutions (S07, S15,
S16, S17, S22, S23). Of the remaining papers, 48% prefer the “ABAC” model to access
control (S03, S04, S05, S06, S09, S10, S14, S18, S19, S20, S21). The strength of the
ABAC approach is its flexibility and expressive power [13]. Using ABAC the "DIAM-
IoT" framework grants device owners to define user-specific rules for control of their
device data.
and SSI solutions are set in the General domain and can be adapted to others as Education or
Supply chain. Within the General domain, architectures and applications have been developed;
however, the most significant number of solutions are schemes, systems, protocols and frame-
works (categorized in others). It proves the DID and SSI blockchain solutions are still in a child
phase with a vast spectrum to be fulfilled.
Although the solutions are in the general domain, they have penetrated more equally into
IT Fields. Attractive solutions addressing IT Architecture, Security, and Privacy fields are pre-
sented. Schanzenbach et al. (S10) developed “reclaimID”, an architecture that allows users to
reclaim their digital identities by securely sharing identity attributes without needing a central-
ized service provider. Similarly, Stokkink and Pouwelse (S09) show a blockchain-based digital
identification solution to provide identity in a situation of mutual mistrust. Their solution is
based on a general model of proven claims, for which verifications of the veracity from outside
sources must be gathered. Moreover, for COVID-19 test takers, Hasan et al. (S15) implemented
a solution with digital medical passports (DMP) and immunity certificates. It describes smart
contracts successfully tested and designed to maintain test-takers’ digital medical identities and
enable rapid responses from the appropriate medical authorities. Definitely, we believe that
the solutions categorized within general postulations should be implemented in a specific area
such as health care, education, government, or industry, so that solutions that are not currently
commercial products can be used by the general public.
The systems (S03, S07, S21, S22), schemas (S11, S12, S18), protocols (S01, S14), and
frameworks (S04, S13, S16, S20) developed using blockchain technology represent 65% of
analyzed papers (15); however, they are not yet practical tools available to the public ("Test
Phase"). This fact could change if these solutions progress quickly and get released as Web ser-
vices, Desktop or Mobile applications. IMEI Database (S02), NEXTLeap (S05), or reclaimID
(S10) are examples of potential future applications; now, they have created only test applications
to validate their proposed approaches.
Regarding blockchain, Public blockchains (e.g; Hyperledger Indy and Ethereum) are the
trend to apply DID and SSI applications (57%). We observed there are vast possibilities to grow
CEDILLO ET AL . D ECENTRALIZED ID AND S ELF -S OVEREIGN I DENTITY S OLUTIONS ...
21
20
Other 1
19
General 1 2 12
18
Transport 1 2 2
17
Supply chain
16
Industry 3
15
Banking and financial 1
14
Retail and eCommerce 1
13
Health care 1
12
Goverment 1
11
Education
10
9
UX and Usability
8
Trust 1 2 7
7
IT Architecture 3
6
DPKI 2 1
5
Authentication 1 7
4
Patterns
3
Privacy 3 2 8
2
Security 3 1 8
1
IoT 4
0
-2 0 2 4
Architecture App Methodology Protoype Others
Fig. 2. Comparison between EC5: Solutions and Applications with EC1: IT Field and EC2: Do-
main.
the contributions of DIDs and SSI in the academic and industrial fields.
This research also raises how much security criteria (RQ3) are currently considered to pro-
pose solutions. Fig 3 shows that ABAC is primarily used to guarantee access control, and the
most used authentication method is Remote-user (57%). Moreover, for encryption, all public
blockchains use public-key algorithms to access.
We found exciting proposals addressing security criteria, such as those in S06, S09, and S20.
In the first study, a proof of concept of a Decentralized OpenID Connect Provider is performed
relying on an auth encrypted, that is, an authenticated public key encrypted and signed by DID;
in the second paper, the authors expose a blockchain-based digital identity solution without
relying on any single trusted third-party, achieving legally valid identity at the passport level;
and the latest proposal introduces a blockchain-based identity framework for IoT correlation
device signatures (low-level identities) and owners identify themselves to use in authentication
credentials and ensure that any IoT entity usually behaves.
13
12 DAC
11 MAC 1 2
10 RBAC 1
9 ABAC 7 1 1
7 Private Key
6 Public Key 12 3 1 1
4 Remote user 8 1 1
3 Biometric 3
2 Token based 2
1 Password based 3 2 1
0
-1 0 1
Public 2
Private 3
Hybrid 4
Consorted
Fig. 3. Comparison between EC6: Access Control Model with EC7: Authentication method, EC8:
Cryptographic algorithms, and EC3: Blockchain type criteria.
tigation in this fields[1] [4]; our systematic review remarks on areas in need of future work:
• Scalability: currently, many proposed novel DIDs and SSI blockchain-based solutions are
either: prototypes, architectures, frameworks, or schemas with implementation promising
scalability in the industrial field. For this reason, releasing applications into the market is
needed.
• User experience: users have poor knowledge of the concepts of DIDs and SSI, but also
about Public-Key Infrastructures (PKIs) and private keys management. This situation
limits the scope of getting non-technical users to try the solutions.
• Patterns: among the solutions analyzed, there are no proposed patterns when developing
schemes, architectures, or frameworks. Patterns are essential as future systems and appli-
cations can be developed easier if they follow a proven basis and have good practices to
apply.
• Security criteria: related to access control criteria, it should be considered deeply in
more studies to propose solutions for generating trust in the user who uses a solution and
preventing them from vulnerabilities. The 26% of analyzed studies in this review do not
consider access control when proposing solutions.
5. Discussion
In this section, the relevance and contribution of the results of the systematic review are dis-
cussed pointing out strengths and weaknesses of the evidence collected. Since our systematic
review’s validity has been considered a relevant aspect, this section also discusses its possible
limitations and how they can be addressed.
CEDILLO ET AL . D ECENTRALIZED ID AND S ELF -S OVEREIGN I DENTITY S OLUTIONS ...
Acknowledgments
The authors would like to thank to Corporación Ecuatoriana para el Desarrollo de la Investi-
gación y Academia - CEDIA for the financial support given to the present research, develop-
ment, and innovation work through its CEPRA program, especially for the “Análisis y aplicación
de formas de interacción humano-computador (HCI) en una herramienta tecnológica de Comu-
nicación Aumentativa y Alternativa (CAA) basada en pictogramas, que ayude a las personas
adultas mayores a comunicarse con su entorno" fund.
References
1. Bartolomeu, P.C., Vieira, E., Hosseini, S.M., Ferreira, J.: Self-Sovereign Identity:
Use-cases, Technologies, and Challenges for Industrial IoT. IEEE International Con-
CEDILLO ET AL . D ECENTRALIZED ID AND S ELF -S OVEREIGN I DENTITY S OLUTIONS ...
Appendices
Appendix A
Extraction criteria. Can be accessed in:
https://bit.ly/SLR-DIDs-SSI-AppendixA
Appendix B
List of papers selected in the systematic review. Can be accessed in:
https://bit.ly/SLR-DIDs-SSI-AppendixB