Privacy-enhanced distributed revocable identity management scheme based self-sovereign identity

Abstract In recent years, the rapid proliferation of digital services and resources on Industrial Internet has imposed higher demands on universality and privacy of identity management. Particularly with the advent of the digital economy, prudent users are urged to maintain control over their digita...

Full description

Saved in:
Bibliographic Details
Main Authors: Junli Fang, Tao Feng, Xian Guo, Xusheng Wang
Format: Article
Language:English
Published: SpringerOpen 2024-11-01
Series:Journal of Cloud Computing: Advances, Systems and Applications
Subjects:
Online Access:https://doi.org/10.1186/s13677-024-00715-8
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Abstract In recent years, the rapid proliferation of digital services and resources on Industrial Internet has imposed higher demands on universality and privacy of identity management. Particularly with the advent of the digital economy, prudent users are urged to maintain control over their digital identity credentials. However, traditional identity management methods have failed to meet this requirement and thus have been prone to raise users' concerns about potential financial loss. Specifically, conventional identity management systems(IDMS) have been plagued by imperceptible privacy disclosure, which derives from the flaws in single points of failure, excessive disclosure, correlation analysis, traceability, and revocation. The emerging Self-Sovereign Identity (SSI) architecture aims to tackle these issues and is propelling the evolution of privacy-enhanced distributed identity management. To this end, we proposed a privacy-enhanced distributed identity management scheme with sequential aggregate issuance, threshold traceability and revocability in the setting of multiple credential issuers and regulators. We adopted the Decentralized identifiers(DIDs) and verifiable credentials(VCs) based on the SSI architecture to ensure the hierarchical identity authentication. The security and performance analysis shows that our proposal achieves the desired design goals and is feasible for distributed Industrial Internet.
ISSN:2192-113X