{"title":"数字身份管理系统分析——双映射视图","authors":"Jianwei Liu, Adam Hodges, Lucas Clay, J. Monarch","doi":"10.1109/BRAINS49436.2020.9223281","DOIUrl":null,"url":null,"abstract":"Digital identity is essential to almost all information systems. This paper provides a new perspective for reducing digital identity management systems (DIMS) to two mappings, the core operations on the mappings, and the trust model built around the mappings. Using this two-mapping view, we derive criteria for determining whether a DIMS solution is self-sovereign. We also compare decentralized identity management solutions with the traditional centralized identity management solutions. From the comparison and analysis, we have the following findings. The differences between decentralized and centralized solutions stem from the trust model differences which dictate storage scheme differences, and therefore other operation-level differences. With a more trustless trust model and storage scheme, current decentralized solutions can be promising candidates for self-sovereign DIMS. Design considerations and certain limitations of the current decentralized solutions are analyzed based on the two-mapping view as well, which can provide useful directions to further study.","PeriodicalId":315392,"journal":{"name":"2020 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"An analysis of digital identity management systems - a two-mapping view\",\"authors\":\"Jianwei Liu, Adam Hodges, Lucas Clay, J. Monarch\",\"doi\":\"10.1109/BRAINS49436.2020.9223281\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Digital identity is essential to almost all information systems. This paper provides a new perspective for reducing digital identity management systems (DIMS) to two mappings, the core operations on the mappings, and the trust model built around the mappings. Using this two-mapping view, we derive criteria for determining whether a DIMS solution is self-sovereign. We also compare decentralized identity management solutions with the traditional centralized identity management solutions. From the comparison and analysis, we have the following findings. The differences between decentralized and centralized solutions stem from the trust model differences which dictate storage scheme differences, and therefore other operation-level differences. With a more trustless trust model and storage scheme, current decentralized solutions can be promising candidates for self-sovereign DIMS. Design considerations and certain limitations of the current decentralized solutions are analyzed based on the two-mapping view as well, which can provide useful directions to further study.\",\"PeriodicalId\":315392,\"journal\":{\"name\":\"2020 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS)\",\"volume\":\"13 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/BRAINS49436.2020.9223281\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/BRAINS49436.2020.9223281","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An analysis of digital identity management systems - a two-mapping view
Digital identity is essential to almost all information systems. This paper provides a new perspective for reducing digital identity management systems (DIMS) to two mappings, the core operations on the mappings, and the trust model built around the mappings. Using this two-mapping view, we derive criteria for determining whether a DIMS solution is self-sovereign. We also compare decentralized identity management solutions with the traditional centralized identity management solutions. From the comparison and analysis, we have the following findings. The differences between decentralized and centralized solutions stem from the trust model differences which dictate storage scheme differences, and therefore other operation-level differences. With a more trustless trust model and storage scheme, current decentralized solutions can be promising candidates for self-sovereign DIMS. Design considerations and certain limitations of the current decentralized solutions are analyzed based on the two-mapping view as well, which can provide useful directions to further study.