Difference between revisions of "Self-Sovereign Identity"

From MgmtWiki
Jump to: navigation, search
(Problem)
(Solutions)
Line 24: Line 24:
 
===How User Information is Used===
 
===How User Information is Used===
 
It's much harder to control how [[User Information]] is used once it has been shared. The best effort underway in early 2019 was the Kartana Initiative Consent Receipt.<ref>Kantara Initiative, ''Consent Receipt Specification.'' (2018-02-20) https://kantarainitiative.org/file-downloads/consent-receipt-specification-v1-1-0/</ref> This document describes a format for a document submitted by a [[Web Site]] to a [[Subject]] after completion of a negotiation on what [[User Information]] can be shared and for what purposes.
 
It's much harder to control how [[User Information]] is used once it has been shared. The best effort underway in early 2019 was the Kartana Initiative Consent Receipt.<ref>Kantara Initiative, ''Consent Receipt Specification.'' (2018-02-20) https://kantarainitiative.org/file-downloads/consent-receipt-specification-v1-1-0/</ref> This document describes a format for a document submitted by a [[Web Site]] to a [[Subject]] after completion of a negotiation on what [[User Information]] can be shared and for what purposes.
 +
 +
==Deployments==
 +
===Buhutan===
 +
In July 2023, Bhutan’s National Assembly passed the National Digital Identity Act (NDI) of Bhutan 2023, which supports and gives rise to the new digital framework; the self-sovereign identity Bhutan NDI Wallet.
 +
 +
The program was spearheaded by Druk Holding and Investments, the commercial and investment. Bhutan is ranked as one of the world’s poorest and least developed countries, and yet it was the first country in the world to roll out a novel sovereign identity (SSI) digital ID system known as the Bhutan NDI.
 +
 +
The Bhutan NDI Wallet is a mobile application that stores a Bhutan citizen’s or Bhutan visitor’s digital credentials. These self-sovereign digital identity credentials leverage the privacy-preserving World Wide Web Consortium (W3C) verified credentials and decentralized identifier standards.
  
 
==References==
 
==References==

Revision as of 22:16, 15 February 2024

Full Title or Meme

Giving users control and ownership of their own Identifiers.

Context

  • Chris Allen described SSI in these terms.[1] See see the problems section for what actually is provided by the implementations.
We use the terminology of SSI, as the concept of individuals or organizations having sole ownership of their digital and analog identities, and control over how their personal data is shared and used. This adds a layer of security and flexibility allowing the identity holder to only reveal the necessary data for any given transaction or interaction. Since identity is such a central part of society, we need to ensure that user control will be the primary foundation SSI will be built upon.
  • Typically a SSI will consist of a Decentralized Identifier (DID) and a DID doc which will contain, at a minimum, access to a public key
  • A real world identity cannot be fully captured in a digital object about that identity, but a digital object with a DID is a complete digital identity that is known as a digital entity. So, in the general case, a Self-Sovereign Identity really is an identity, but of the digital object, not the real-world user.

Problem

While this section lists a few of the problems that arise from SSI, the largest issue is that the claims made for SSI are not actually met by any of the implementations. One example is the claim that the user is in control of their identifier. All that existing implementations (in 2021) provide is proof that the user can sign a document. Whether the user has lost control of the signing operation, which could well be in the attackers possession, is their own possession of the private key. Unlike the real-world, in the digital world proof of possession is nowhere near to proof of control. Similar problems exist throughout the claims made in the docs.

  1. If the user is in charge of the device that asserts their identity, it still requires some other trusted entity to make an assertion about the level of Assurance that can be placed in the identifier.
  2. The device of choice for a majority of users today is the Smartphone which does not have the capacity to run as an always on service.
  3. The information contained in a DID doc is not likely to contain sufficient information to know if there is a real-world entity associated with the DID, nor if the DID applies to a Natural Person. This was done specifically to avoid activation of any laws dealing with privacy or redress. In effect the DID is designed to be lawless. It remains to be seen if governments around the world will agree to this lawless status.

Solutions

Efforts are underway to address the two ideas described by Chris Allen above:

How User Information is Shared

Sharing is controlled by splitting user Identifiers and Attributes into separate chunks, each chunk holding several Claims.

How User Information is Used

It's much harder to control how User Information is used once it has been shared. The best effort underway in early 2019 was the Kartana Initiative Consent Receipt.[2] This document describes a format for a document submitted by a Web Site to a Subject after completion of a negotiation on what User Information can be shared and for what purposes.

Deployments

Buhutan

In July 2023, Bhutan’s National Assembly passed the National Digital Identity Act (NDI) of Bhutan 2023, which supports and gives rise to the new digital framework; the self-sovereign identity Bhutan NDI Wallet.

The program was spearheaded by Druk Holding and Investments, the commercial and investment. Bhutan is ranked as one of the world’s poorest and least developed countries, and yet it was the first country in the world to roll out a novel sovereign identity (SSI) digital ID system known as the Bhutan NDI.

The Bhutan NDI Wallet is a mobile application that stores a Bhutan citizen’s or Bhutan visitor’s digital credentials. These self-sovereign digital identity credentials leverage the privacy-preserving World Wide Web Consortium (W3C) verified credentials and decentralized identifier standards.

References

  1. Christopher Allen, Introduction to Self-Sovereign Identity and Its 10 Guiding Principles. (2019-01-09) Medium https://medium.com/metadium/introduction-to-self-sovereign-identity-and-its-10-guiding-principles-97c1ba603872
  2. Kantara Initiative, Consent Receipt Specification. (2018-02-20) https://kantarainitiative.org/file-downloads/consent-receipt-specification-v1-1-0/

Additional Material