You are here: Home Contents V16 N2 V16N2_Sunda.html
Personal tools

Online Privacy - Self-Sovereign Identity



Full text

Journal of Information System Security
Volume 16, Number 2 (2020)
Pages 121135
ISSN 1551-0123
Kristine Sunda — University of Wisconsin – Madison, USA
Information Institute Publishing, Washington DC, USA




The purpose of this paper is to explore the role of self-sovereign identity in online privacy. Online privacy has been based on passwords protecting us through third party applications owning credentials. Biometrics and dual-factor authentication were introduced to increase privacy protections in centralized authentications. Federated identification provided less centralization for authentication. The latest generation of identity management introduces self-sovereign identity, using blockchain to create an independent digital identity.
Identity began with centralized certification from state authorities providing official certification, such as the driver’s licenses and birth certificates. Digital identity began with centralized organizations overseeing the validity of IP addresses and domain names. Soon to follow, user accounts and passwords grew to be defined personal identification. Self-sovereign identity uses decentralized identifiers (DIDs) to enable verifiable, decentralized digital identity and ties users to identities and certified credentials using blockchain.




Privacy, Security, Identity Management, Self-Sovereign Identity, Blockchain Credentials, Decentralized Digital Identity.




Allen, C. (2016, 04 25). Life With Alacrity. Retrieved from The Path to Self-Sovereign Identity.:

Bernabe, J. B., David, M., Moreno, R. T., Cordero, J. P., Bahloul, S., and Skarmeta, A. (2020). ARIES: Evaluation of a reliable and privacy-preserving European identity management framework. Future Generation Computer Systems, 409-425.

Bouras, M. A., Lu, Q., Zhang, F., Wan, Y., Zhang, T., and Ning, H. (2020). Distributed Ledger Technology for eHealth Identity Privacy: State of The Art and Future Perspective. Sensors, 483-503.

Camenisch, J. and Herreweghen, E. V. (2002). Design and implementation of the idemix anonymous credential system. 9th ACM conference on Computer and communications security (CCS’02) (pp. 21-30). New York: Association for Computing Machinery.

Durant, E. and Trachy, A. (2017, October 17). MIT News: On Campus and Around the World. Retrieved from Digital Diploma debuts at MIT:

Fedrecheski, G., Rabaey, J. M., Costa, L. C., Clacina Ccori, P. C., Pereira, W. T., and Zuffo, M. K. (2018, June 26). Self-Sovereign Identity for IoT environments: A Perspective. 2020 Global Internet of Things Summit (GloTS) (pp. 1-6). Dublin: IEEE. Retrieved from Medium:

Goanta, C. (2020). The Private Governance of Identity on the Silk Road. Frontiers in Blockchain, 3:4.

Gstrein, O. J. and Kochenov, D. (2020). Digital Identity and Distributed Ledger Technology: Paving the Way to a Neo-Feudal Brave New World? Frontiers in Blockchain, 3:10.

Hill, N. (1987). Think and Grow Rich. New York: Fawcett Books.

Jordan, K., Hauser, J., and Forster, S. (2003). The Augmented Social Network: Building identity and trust into the next-generation Internet. First Monday, 8:8.

Locke, J. (2008). An Essay Concerning Human Understanding. (P. H. Nidditch, Ed.) Clarendon: Oxford.

Othman, A. and Callahan, J. (2018). The Horcrux Protocol: A Method for Decentralized Biometric-based Self-sovereign Identity. International Joint Conference on Neural Networks (IJCNN), (pp. 1-7). Rio de Janeiro.

Schroeder, R. (2019, November 6). A Fresh Look at Blockchain in Higher Ed. Retrieved from Inside Higher Ed:

Schwartz, M. (2010, June 24). Educause Review. EDUCAUSE Review. Retrieved from Federated Identity: A Recipe for Higher Education:

Wang, F. and De Filippi, P. (2020). Self-Sovereign Identity in a Globalized World: Credentials-Based Identity Systems as a Driver for Economic Inclusion. Frontiers in Blockchain, 2:28.