Volltext-Downloads (blau) und Frontdoor-Views (grau)

Distributed Authentication using Self Sovereign Identities

  • Traditional authentication involves sharing a considerable amount of personal and identifying information. Usually, a single central authority controls the data of all their users. This creates a single point of failure and users typically have to relinquish control over their data. Therefore it is important to explore alternate authentication mechanisms to uphold data sovereignty. DataTraditional authentication involves sharing a considerable amount of personal and identifying information. Usually, a single central authority controls the data of all their users. This creates a single point of failure and users typically have to relinquish control over their data. Therefore it is important to explore alternate authentication mechanisms to uphold data sovereignty. Data sovereignty describes forms of independence, control, and autonomy over digital data. Enforcing data sovereignty also requires independence from central authorities. This paper explores alternate decentralized authentication methods. It leverages Verifiable Credentials (VCs) which allow verification without needing to contact the issuer and self-sovereign identities in the form of Decentralized IDentifiers (DIDs). This paper aims to leverage the decentralized authentication supported by VCs and DIDs and provide two use cases that might explain how they could be used.show moreshow less

Export metadata

Additional Services

Search Google Scholar

Statistics

frontdoor_oas
Metadaten
Document Type:Conference Proceeding
Conference Type:Konferenzartikel
Zitierlink: https://opus.hs-offenburg.de/9961
Bibliografische Angaben
Title (English):Distributed Authentication using Self Sovereign Identities
Conference:International Conference on Emerging Technologies for Dependable Internet of Things (1. : 25-26 November 2024 : Sana'a, Yemen)
Author:Charan AnnaduraiStaff Member, Axel SikoraStaff MemberORCiDGND, Dominik WelteStaff MemberORCiD
Year of Publication:2024
Date of first Publication:2024/12/11
Publisher:IEEE
First Page:1
Last Page:8
Parent Title (English):1st International Conference on Emerging Technologies for Dependable Internet of Things (ICETI 2024)
ISBN:979-8-3315-3355-7 (Elektronisch)
ISBN:979-8-3315-3356-4 (Print on Demand)
DOI:https://doi.org/10.1109/ICETI63946.2024.10777147
Language:English
Inhaltliche Informationen
Institutes:Forschung / ivESK - Institut für verlässliche Embedded Systems und Kommunikationselektronik
Fakultät Elektrotechnik, Medizintechnik und Informatik (EMI) (ab 04/2019)
Collections of the Offenburg University:Bibliografie
Tag:Blockchain; Data Sovereignty; Decentralized Authentication; Decentralized Identifiers; Self-Sovereign Identity; Verifiable Credentials
Formale Angaben
Relevance for "Jahresbericht über Forschungsleistungen":Konferenzbeitrag: h5-Index < 30
Open Access: Closed 
Licence (German):License LogoUrheberrechtlich geschützt