| Literature DB >> 35957198 |
Frederico Schardong1,2, Ricardo Custódio1.
Abstract
Self-Sovereign Identity (SSI) is an identity model centered on the user. The user maintains and controls their data in this model. When a service provider requests data from the user, the user sends it directly to the service provider, bypassing third-party intermediaries. Thus, SSI reduces identity providers' involvement in the identification, authentication, and authorization, thereby increasing user privacy. Additionally, users can share portions of their personal information with service providers, significantly improving user privacy. This identity model has drawn the attention of researchers and organizations worldwide, resulting in an increase in both scientific and non-scientific literature on the subject. This study conducts a comprehensive and rigorous systematic review of the literature and a systematic mapping of theoretical and practical advances in SSI. We identified and analyzed evidence from reviewed materials to address four research questions, resulting in a novel SSI taxonomy used to categorize and review publications. Additionally, open challenges are discussed along with recommendations for future work.Entities:
Keywords: SSI; identity and access management; identity management; privacy; review; self-sovereign identity; survey; systematic literature review; systematic mapping; taxonomy
Mesh:
Year: 2022 PMID: 35957198 PMCID: PMC9371034 DOI: 10.3390/s22155641
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.847
Figure 1The IAM models. Constant lines represent interactions, and dashed lines mean trust.
Figure 2The actors, their electronic identities, and the interactions to issue a VC and present a VP.
Comparison with other secondary studies in the literature.
| Systematic | Systematic | Taxonomy | Include | Other than | Conceptual | Covered | |
|---|---|---|---|---|---|---|---|
| Liu et al. [ | No | No |
| No | Pragmatic | 50 | |
| Čučko et al. [ | No |
| No | No |
| Pragmatic | 80 |
| Ghaffari et al. [ | No | No |
| No | No | Pragmatic | 21 |
| Mulaji and Roodt [ | No | No | No |
| No | Pragmatic | 69 |
| Kuperberg [ | No | No | No | No | No | Pragmatic | 43 |
| Zhu and Badr [ | No | No | No | No | No | Pragmatic | 15 |
| Lim et al. [ | No | No | No | No | No | Pragmatic | 15 |
| Kaneriya and Patel [ | No | No | No | No | No | Pragmatic | 6 |
| Gilani et al. [ | No | No | No | No | No | Pragmatic | 8 |
| Dib and Toumi [ | No | No | No | No | No | Pragmatic | 10 |
| Mühle et al. [ | No | No | No | No | No | Pragmatic | 9 |
| Schmidt et al. [ | No |
|
| No | No | Pragmatic | 147 |
|
|
|
|
|
|
|
|
|
1 Presented their search string but do not provide any information about their review method.
Inclusion and exclusion criteria.
| Inclusion Criteria | |
|---|---|
| IC-1 | The paper includes a novel conceptual contribution to SSI. |
| IC-2 | The research work makes practical progress toward SSI. |
|
| |
| EC-1 | The research work is not in the area of computer science. |
Data extraction form adapted from [77].
| Data Item | Description | RQ |
|---|---|---|
|
| ||
| Study ID | Unique integer identifier per article | |
| Article Title | Name of the article | |
| Year | Year of publication | RQ-4 |
| Article Authors | Name of the authors | RQ-4 |
| Venue | Publication venue | RQ-4 |
|
| ||
| Add Concept | What concept/idea is introduced | RQ-3 |
| Refute Concept | What concept/idea is refuted | RQ-3 |
|
| ||
| Formal Model | How is SSI formally specified | RQ-2 |
|
| ||
| Novel Problem | What practical problem is presented | RQ-1 |
| Proposed Solution | How is the practical problem solved | RQ-1 |
Number of studies.
| Tool | Total |
|---|---|
| ACM Digital Library | 16 |
| IEEE Xplore Digital Library | 99 |
| ScienceDirect | 17 |
| Springer Link | 40 |
| Scopus | 235 |
| Web of Science | 131 |
| Google Scholar | 180 |
|
|
|
| Google Patents | 17 |
|
|
|
Figure 3Number of articles in each stage of our study selection.
Figure 4Taxonomy of SSI.
Publications that introduced and solved novel problems in the SSI ecosystem.
| Credential | System Design | Trust | |||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Management | Operational | ||||||||||||||||||||||||
| VC | VP | ||||||||||||||||||||||||
| Works | Metadata Search | Protocol Integration | Identity Derivation | Wallet Security | Auditability | Credential as a Service | Revocation | Decentralized Identifiers | Issuer Authorization | Delegation | Backup and Recovery | Revocation | Verifier Authorization | Data Minimization | Reuse Prevention | SSI Design/Architecture | HCI | Risk Assessment | Threat/Attack Model | Reputation Model | Trust Policy Evaluation | ||||
| [ | ✓ | ||||||||||||||||||||||||
| [ | ✓ | ✓ | |||||||||||||||||||||||
| [ | ✓ | ||||||||||||||||||||||||
| [ | ✓ | ||||||||||||||||||||||||
| [ | ✓ | ✓ | |||||||||||||||||||||||
| [ | ✓ | ✓ | ✓ | ✓ | |||||||||||||||||||||
| [ | ✓ | ✓ | ✓ | ||||||||||||||||||||||
| [ | ✓ | ✓ | |||||||||||||||||||||||
| [ | ✓ | ||||||||||||||||||||||||
| [ | ✓ | ✓ | |||||||||||||||||||||||
| [ | ✓ | ✓ | |||||||||||||||||||||||
| [ | ✓ | ✓ | ✓ | ||||||||||||||||||||||
| [ | ✓ | ✓ | ✓ | ✓ | |||||||||||||||||||||
| [ | ✓ | ✓ | ✓ | ||||||||||||||||||||||
| [ | ✓ | ✓ | |||||||||||||||||||||||
| [ | ✓ | ✓ | ✓ | ✓ | ✓ | ||||||||||||||||||||
| [ | ✓ | ✓ | ✓ | ||||||||||||||||||||||
| [ | ✓ | ✓ | ✓ | ||||||||||||||||||||||
| [ | ✓ | ✓ | |||||||||||||||||||||||
| [ | ✓ | ✓ | |||||||||||||||||||||||
| [ | ✓ | ✓ | |||||||||||||||||||||||
| [ | ✓ | ||||||||||||||||||||||||
| [ | ✓ | ||||||||||||||||||||||||
| [ | ✓ | ✓ | |||||||||||||||||||||||
| [ | ✓ | ||||||||||||||||||||||||
| [ | ✓ | ✓ | |||||||||||||||||||||||
| [ | ✓ | ||||||||||||||||||||||||
| [ | ✓ | ||||||||||||||||||||||||
| [ | ✓ | ✓ | ✓ | ||||||||||||||||||||||
| [ | ✓ | ||||||||||||||||||||||||
| [ | ✓ | ||||||||||||||||||||||||
| [ | ✓ | ✓ | ✓ | ✓ | |||||||||||||||||||||
| [ | ✓ | ||||||||||||||||||||||||
| [ | ✓ | ✓ | |||||||||||||||||||||||
| [ | ✓ | ✓ | |||||||||||||||||||||||
| [ | ✓ | ✓ | |||||||||||||||||||||||
| [ | ✓ | ||||||||||||||||||||||||
| [ | ✓ | ✓ | |||||||||||||||||||||||
| [ | ✓ | ||||||||||||||||||||||||
| [ | ✓ | ||||||||||||||||||||||||
| [ | ✓ | ✓ | |||||||||||||||||||||||
| [ | ✓ | ✓ | |||||||||||||||||||||||
| [ | ✓ | ||||||||||||||||||||||||
A tabular presentation of Table 5.
| Facet | Total | Works |
|---|---|---|
| Metadata Search | 2 | [ |
| Protocol Integration | 11 | [ |
| Identity Derivation | 8 | [ |
| Wallet Security | 2 | [ |
| Auditability | 3 | [ |
| Credential as a Service | 3 | [ |
| Revocation | 6 | [ |
| Decentralized Identifiers | 7 | [ |
| Issuer Authorization | 3 | [ |
| Delegation | 5 | [ |
| Backup and Recovery | 6 | [ |
| Revocation | 4 | [ |
| Verifier Authorization | 1 | [ |
| Data Minimization | 9 | [ |
| Reuse Prevention | 1 | [ |
| SSI Design/Architecture | 6 | [ |
| HCI | 6 | [ |
| Risk Assessment | 3 | [ |
| Threat/Attack Model | 21 | [ |
| Reputation Model | 6 | [ |
| Trust Policy Evaluation | 8 | [ |
Publications that introduce mathematical formalism to SSI. Techniques are divided into cryptographic and non-cryptographic tools.
| Concept | Works | Formalism | Non-Crypto. Tools | Cryptographic Tools | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| ILP | Graph | NS | Prob. | MPC | SSS | PRE | CH | ABE | ZKP | CAcc | MS | FHE | |||||
| Identity Derivation | [ | ✓ | ✓ | ||||||||||||||
| Credential as a Service | [ | ✓ | ✓ | ✓ | |||||||||||||
| Revocation | [ | ✓ | ✓ | ✓ | |||||||||||||
| [ | ✓ | ✓ | |||||||||||||||
| [ | ✓ | ✓ | |||||||||||||||
| [ | ✓ | ||||||||||||||||
| [ | ✓ | ✓ | ✓ | ||||||||||||||
| Decentralized Identifiers | [ | ✓ | |||||||||||||||
| Issuer Authorization | [ | ✓ | ✓ | ✓ | |||||||||||||
| [ | ✓ | ✓ | ✓ | ||||||||||||||
| Backup and Recovery | [ | ✓ | ✓ | ||||||||||||||
| [ | ✓ | ✓ | |||||||||||||||
| [ | ✓ | ✓ | |||||||||||||||
| Verifier Authorization | [ | ✓ | ✓ | ||||||||||||||
| Data Minimization | [ | ✓ | ✓ | ||||||||||||||
| [ | ✓ | ✓ | ✓ | ||||||||||||||
| Reuse Prevention | [ | ✓ | ✓ | ||||||||||||||
| SSI Design/Architecture | [ | ✓ | |||||||||||||||
| Reputation Model | [ | ✓ | ✓ | ||||||||||||||
| [ | ✓ | ✓ | |||||||||||||||
| Trust Policy Evaluation | [ | ✓ | ✓ | ✓ | |||||||||||||
Abbreviations: Integer Linear Programming (ILP), Name System (NS), Multi-Party Computation (MPC), Shamir’s Secret Sharing (SSS), Proxy Re-Encryption (PRE), Chameleon Hashing (CH), Attribute-Based Encryption (ABE), Zero-Knowledge Proof (ZKP), Cryptographic Accumulator (CAcc), Multi-Signature (MS), and Fully Homomorphic Encryption (FHE).
Publications that add or refute philosophical views of SSI.
| Add | Refute | ||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Functional | Non-Functional | ||||||||||||||||||||||||
| Works | No Central Authority | Legacy Compatible | Verifiable Presentation | Counterfeit Prevention | Identity Verification | Identity Assurance | Secure transactions | Delegation | Recoverability | Usability | Accessibility | Availability | Auditability | Scalability | Free | Regulatory | Existence | Control | Access | Consent | Persistence | Transparency | Protection | ||
| [ | ✓ | ||||||||||||||||||||||||
| [ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | |||||||||||||||||
| [ | ✓ | ✓ | |||||||||||||||||||||||
| [ | ✓ | ✓ | ✓ | ✓ | |||||||||||||||||||||
| [ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | |||||||||||||||||||
| [ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ||||||||||||||||||
| [ | ✓ | ✓ | |||||||||||||||||||||||
| [ | ✓ | ✓ | ✓ | ||||||||||||||||||||||
| [ | ✓ | ||||||||||||||||||||||||
| [ | ✓ | ✓ | ✓ | ||||||||||||||||||||||
| [ | ✓ | ✓ | ✓ | ||||||||||||||||||||||
| [ | ✓ | ||||||||||||||||||||||||
| [ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | |||||||||||||||||
| [ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | |||||||||||||||||||
| [ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | |||||||||||||||||||
Publications per year.
| Year | Total | Studies |
|---|---|---|
| 2016 | 2 | [ |
| 2017 | 5 | [ |
| 2018 | 5 | [ |
| 2019 | 14 | [ |
| 2020 | 19 | [ |
| 2021 | 37 | [ |
Figure 5The number of publications in each facet of our taxonomy over time.
Types of publishing venues over the years.
| Venue Type | Total | 2016 | 2017 | 2018 | 2019 | 2020 | 2021 |
|---|---|---|---|---|---|---|---|
| Blog Post | 1 | [ | |||||
| Website | 2 | [ | [ | ||||
| Report | 1 | [ | |||||
| Standard | 4 | [ | [ | [ | |||
| Web Archive | 7 | [ | [ | [ | |||
| Conference | 42 | [ | [ | [ | [ | [ | |
| Journal | 15 | [ | [ | [ | [ | ||
| Patent | 2 | [ | |||||
| Bachelor Thesis | 1 | [ | |||||
| Master Thesis | 6 | [ | [ | [ | [ | ||
| PhD Thesis | 1 | [ |
Conferences, symposia and forums with multiple publications.
| Venue Name | Total | Studies |
|---|---|---|
| Conference on Blockchain Research & Applications for Innovative Networks and Services | 2 | [ |
| Open Identity Summit | 2 | [ |
| International Conference on Information Networking | 2 | [ |
| IEEE Symposium Series on Computational Intelligence | 2 | [ |
| IEEE International Congress on Cybermatics | 2 | [ |
| IEEE International Conference on Blockchain and Cryptocurrency | 2 | [ |
| IEEE International Conference on Trust, Security and Privacy in Computing and Communications | 2 | [ |
Complete list of studies published in conferences, symposia, forums or workshops.
| Venue Name | Total | Studies |
|---|---|---|
| Conference on Blockchain Research & Applications for Innovative Networks and Services | 2 | [ |
| Open Identity Summit | 2 | [ |
| International Conference on Information Networking | 2 | [ |
| IEEE Symposium Series on Computational Intelligence | 2 | [ |
| IEEE International Congress on Cybermatics | 2 | [ |
| IEEE International Conference on Blockchain and Cryptocurrency | 2 | [ |
| IEEE International Conference on Trust, Security and Privacy in Computing and Communications | 2 | [ |
| IEEE International Conference on Internet of Things: Systems, Management and Security | 1 | [ |
| IEEE International Conference on Mobile Cloud Computing, Services, and Engineering | 1 | [ |
| IEEE International Conference on Cloud Engineering | 1 | [ |
| IEEE International Symposium on Network Computing and Applications | 1 | [ |
| IEEE International Symposium on Dependable, Autonomic and Secure Computing | 1 | [ |
| IEEE International Conference on Pervasive Computing and Communications Workshops | 1 | [ |
| IEEE Annual Computers, Software, and Applications Conference | 1 | [ |
| IEEE Conference on Computer Vision and Pattern Recognition Workshops | 1 | [ |
| IEEE International Performance, Computing, and Communications Conference | 1 | [ |
| IEEE International Conference on Systems, Man, and Cybernetics | 1 | [ |
| IEEE Symposium on Computers and Communications | 1 | [ |
| IFIP International Conference on Information Security Theory and Practice | 1 | [ |
| IFIP International Summer School on Privacy and Identity Management | 1 | [ |
| IFIP International Conference on New Technologies, Mobility and Security | 1 | [ |
| ACM Celebration of Women in Computing | 1 | [ |
| International Conference on Information and Communications Security | 1 | [ |
| International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing | 1 | [ |
| International Conference on Security and Cryptography | 1 | [ |
| International Teletraffic Congress | 1 | [ |
| International Symposium on Networks, Computers and Communications | 1 | [ |
| International Conference on Business Process Management Workshops | 1 | [ |
| International Conference on Cryptology and Network Security | 1 | [ |
| Symposium on Cryptography and Information Security | 1 | [ |
| Annual Privacy Forum | 1 | [ |
| Annual Conference of the South African Institute of Computer Scientists and Information Technologists | 1 | [ |
| Rebooting the Web-of-Trust | 1 | [ |
| Gesellschaft fur Informatik (GI) | 1 | [ |
| Workshop on Decentralized IoT Systems and Security | 1 | [ |
Studies published in journals.
| Journal Name | Total | Studies |
|---|---|---|
| Frontiers in Blockchain | 2 | [ |
| IEEE Access | 2 | [ |
| IEEE Internet of Things Journal | 2 | [ |
| IEEE Software | 1 | [ |
| IEEE Security and Privacy | 1 | [ |
| IEEE Transactions on Vehicular Technology | 1 | [ |
| IEEE Transactions on Computational Social Systems | 1 | [ |
| Elsevier Computer Science Review | 1 | [ |
| Elsevier Computers & Security | 1 | [ |
| MDPI Electronics | 1 | [ |
| IEICE Transactions on Information and Systems | 1 | [ |
| Ledger | 1 | [ |
Figure 6Co-authorship network graph, where vertices represent authors and edges their co-authorship of one or more works.
Figure 7Co-reference network.