Research Article
BibTex RIS Cite

A Case Study for Mobile Wallet Implementation in Self-Sovereign Identity Infrastructure

Year 2023, Volume: 3 Issue: 1, 1 - 16, 30.06.2023

Abstract

The concept of Self-Sovereign Identity (SSI), where we can store our personal information and documents securely, as proven by the relevant authorities, and share them with the people we want, has become widespread as the personal secure data storage method that we need most in recent years. We have to physically carry our evidence-based identities obtained from events or institutions. Keeping our identity, age, health status, educational status, and many other personal data inaccessible to others and without questioning the accuracy when we share them also restricts their use in different areas. Sharing the data depending on the consent of the people and presenting the data accurately and reliably has become one of our most important needs today. With the concept of SSI, it has become possible for us to save our data as distributed, inaccessible, unalterable, and incorruptible. In addition, with the possibility of public access to the information with the consent of the people, it is possible to instantly share the information with the people/institutions we want. This study will explain mobile application processes created on SSI infrastructure. It will be possible to add different institutions to the developed system and to identify the added institutions to the users. The identities given by the institutions will be able to be proven by different institutions. Thus, the operating structure of this system will be transferred with a verifiable and reliable infrastructure. This study, it is aimed to contribute to the general operating processes of those who will develop the SSI infrastructure. To develop such a system, it has been determined that ACA-Py is the most suitable infrastructure framework. After comparing the efficacy of Askar and Indy for the selection of the wallet to be used, it was determined that the Askar wallet would be used in the system.

References

  • [1] N. Waraporn, M. Sithiyavanich, H. Jiarawattanasawat, and N. Pakchai, “Virtual credit cards on mobile for M-commerce payment,” in Proceedings - IEEE International Conference on e-Business Engineering, ICEBE 2009; IEEE Int. Workshops - AiR 2009; SOAIC 2009; SOKMBI 2009; ASOC 2009, 2009. doi: 10.1109/ICEBE.2009.40.
  • [2] J. Pesonen and E. Horster, “Near field communication technology in tourism,” Tour Manag Perspect, vol. 4, 2012, doi: 10.1016/j.tmp.2012.04.001.
  • [3] M. Shuaib et al., “Self-Sovereign Identity Solution for Blockchain-Based Land Registry System: A Comparison,” Mobile Information Systems, vol. 2022. 2022. doi: 10.1155/2022/8930472.
  • [4] S. Joghee, H. M. Alzoubi, and A. R. Dubey, “Decisions effectiveness of FDI investment biases at real estate industry: Empirical evidence from Dubai smart city projects,” International Journal of Scientific and Technology Research, vol. 9, no. 3, 2020.
  • [5] K. H. Law and J. P. Lynch, “Smart City: Technologies and Challenges,” IT Prof, vol. 21, no. 6, 2019, doi: 10.1109/MITP.2019.2935405.
  • [6] R. Soltani, U. T. Nguyen, and A. An, “A Survey of Self-Sovereign Identity Ecosystem,” Security and Communication Networks, vol. 2021, pp. 1–26, Jul. 2021, doi: 10.1155/2021/8873429.
  • [7] X. Li, P. Jiang, T. Chen, X. Luo, and Q. Wen, “A survey on the security of blockchain systems,” Future Generation Computer Systems, vol. 107, pp. 841–853, Jun. 2020, doi: 10.1016/j.future.2017.08.020.
  • [8] N. V Kulabukhova, “ZERO-KNOWLEDGE PROOF IN SELF-SOVEREIGN IDENTITY,” 2019.
  • [9] D. van Bokkem, R. Hageman, G. Koning, L. Nguyen, and N. Zarin, “Self-Sovereign Identity Solutions: The Necessity of Blockchain Technology,” Apr. 2019.
  • [10] B. Houtan, A. S. Hafid, and D. Makrakis, “A Survey on Blockchain-Based Self-Sovereign Patient Identity in Healthcare,” IEEE Access, vol. 8, pp. 90478–90494, 2020, doi: 10.1109/ACCESS.2020.2994090.
  • [11] A. Akande, “Disruptive power of blockchain on the insurance industry,” Master’s Thesis, Universiti of Tartu, Institute of Computer Science, Software Engineering Curriculum, 2018.
  • [12] M. Shuaib, S. Alam, M. Shabbir Alam, and M. Shahnawaz Nasir, “Self-sovereign identity for healthcare using blockchain,” Mater Today Proc, Mar. 2021, doi: 10.1016/j.matpr.2021.03.083.
  • [13] L. Cocco, R. Tonelli, and M. Marchesi, “Blockchain and self sovereign identity to support quality in the food supply chain,” Future Internet, vol. 13, no. 12, Dec. 2021, doi: 10.3390/fi13120301.
  • [14] L. Stockburger, G. Kokosioulis, A. Mukkamala, R. R. Mukkamala, and M. Avital, “Blockchain-enabled decentralized identity management: The case of self-sovereign identity in public transportation,” Blockchain: Research and Applications, vol. 2, no. 2, 2021, doi: 10.1016/j.bcra.2021.100014.
  • [15] Y. Liu, Q. Lu, H. Y. Paik, and X. Xu, “Design Patterns for Blockchain-based Self-Sovereign Identity,” in ACM International Conference Proceeding Series, Association for Computing Machinery, Jul. 2020. doi: 10.1145/3424771.3424802.
  • [16] A. Mühle, A. Grüner, T. Gayvoronskaya, and C. Meinel, “A survey on essential components of a self-sovereign identity,” Computer Science Review, vol. 30. Elsevier Ireland Ltd, pp. 80–86, 2018. doi: 10.1016/j.cosrev.2018.10.002.
  • [17] D. S. Baars, “Towards self-sovereign identity using blockchain technology.” Oct. 2016. [Online]. Available: http://essay.utwente.nl/71274/
  • [18] Q. Stokkink and J. Pouwelse, “Deployment of a Blockchain-Based Self-Sovereign Identity,” in 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), IEEE, Jul. 2018, pp. 1336–1342. doi: 10.1109/Cybermatics_2018.2018.00230.
  • [19] G. Kondova and J. Erbguth, “Self-sovereign identity on public blockchains and the GDPR,” in Proceedings of the ACM Symposium on Applied Computing, Association for Computing Machinery, Mar. 2020, pp. 342–345. doi: 10.1145/3341105.3374066.
  • [20] N. Naik and P. Jenkins, “Self-Sovereign Identity Specifications: Govern Your Identity through Your Digital Wallet using Blockchain Technology,” in Proceedings - 2020 8th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, MobileCloud 2020, 2020. doi: 10.1109/MobileCloud48802.2020.00021.
  • [21] Y. Liu, Q. Lu, H. Y. Paik, X. Xu, S. Chen, and L. Zhu, “Design Pattern as a Service for Blockchain-Based Self-Sovereign Identity,” IEEE Softw, vol. 37, no. 5, pp. 30–36, Sep. 2020, doi: 10.1109/MS.2020.2992783.
Year 2023, Volume: 3 Issue: 1, 1 - 16, 30.06.2023

Abstract

References

  • [1] N. Waraporn, M. Sithiyavanich, H. Jiarawattanasawat, and N. Pakchai, “Virtual credit cards on mobile for M-commerce payment,” in Proceedings - IEEE International Conference on e-Business Engineering, ICEBE 2009; IEEE Int. Workshops - AiR 2009; SOAIC 2009; SOKMBI 2009; ASOC 2009, 2009. doi: 10.1109/ICEBE.2009.40.
  • [2] J. Pesonen and E. Horster, “Near field communication technology in tourism,” Tour Manag Perspect, vol. 4, 2012, doi: 10.1016/j.tmp.2012.04.001.
  • [3] M. Shuaib et al., “Self-Sovereign Identity Solution for Blockchain-Based Land Registry System: A Comparison,” Mobile Information Systems, vol. 2022. 2022. doi: 10.1155/2022/8930472.
  • [4] S. Joghee, H. M. Alzoubi, and A. R. Dubey, “Decisions effectiveness of FDI investment biases at real estate industry: Empirical evidence from Dubai smart city projects,” International Journal of Scientific and Technology Research, vol. 9, no. 3, 2020.
  • [5] K. H. Law and J. P. Lynch, “Smart City: Technologies and Challenges,” IT Prof, vol. 21, no. 6, 2019, doi: 10.1109/MITP.2019.2935405.
  • [6] R. Soltani, U. T. Nguyen, and A. An, “A Survey of Self-Sovereign Identity Ecosystem,” Security and Communication Networks, vol. 2021, pp. 1–26, Jul. 2021, doi: 10.1155/2021/8873429.
  • [7] X. Li, P. Jiang, T. Chen, X. Luo, and Q. Wen, “A survey on the security of blockchain systems,” Future Generation Computer Systems, vol. 107, pp. 841–853, Jun. 2020, doi: 10.1016/j.future.2017.08.020.
  • [8] N. V Kulabukhova, “ZERO-KNOWLEDGE PROOF IN SELF-SOVEREIGN IDENTITY,” 2019.
  • [9] D. van Bokkem, R. Hageman, G. Koning, L. Nguyen, and N. Zarin, “Self-Sovereign Identity Solutions: The Necessity of Blockchain Technology,” Apr. 2019.
  • [10] B. Houtan, A. S. Hafid, and D. Makrakis, “A Survey on Blockchain-Based Self-Sovereign Patient Identity in Healthcare,” IEEE Access, vol. 8, pp. 90478–90494, 2020, doi: 10.1109/ACCESS.2020.2994090.
  • [11] A. Akande, “Disruptive power of blockchain on the insurance industry,” Master’s Thesis, Universiti of Tartu, Institute of Computer Science, Software Engineering Curriculum, 2018.
  • [12] M. Shuaib, S. Alam, M. Shabbir Alam, and M. Shahnawaz Nasir, “Self-sovereign identity for healthcare using blockchain,” Mater Today Proc, Mar. 2021, doi: 10.1016/j.matpr.2021.03.083.
  • [13] L. Cocco, R. Tonelli, and M. Marchesi, “Blockchain and self sovereign identity to support quality in the food supply chain,” Future Internet, vol. 13, no. 12, Dec. 2021, doi: 10.3390/fi13120301.
  • [14] L. Stockburger, G. Kokosioulis, A. Mukkamala, R. R. Mukkamala, and M. Avital, “Blockchain-enabled decentralized identity management: The case of self-sovereign identity in public transportation,” Blockchain: Research and Applications, vol. 2, no. 2, 2021, doi: 10.1016/j.bcra.2021.100014.
  • [15] Y. Liu, Q. Lu, H. Y. Paik, and X. Xu, “Design Patterns for Blockchain-based Self-Sovereign Identity,” in ACM International Conference Proceeding Series, Association for Computing Machinery, Jul. 2020. doi: 10.1145/3424771.3424802.
  • [16] A. Mühle, A. Grüner, T. Gayvoronskaya, and C. Meinel, “A survey on essential components of a self-sovereign identity,” Computer Science Review, vol. 30. Elsevier Ireland Ltd, pp. 80–86, 2018. doi: 10.1016/j.cosrev.2018.10.002.
  • [17] D. S. Baars, “Towards self-sovereign identity using blockchain technology.” Oct. 2016. [Online]. Available: http://essay.utwente.nl/71274/
  • [18] Q. Stokkink and J. Pouwelse, “Deployment of a Blockchain-Based Self-Sovereign Identity,” in 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), IEEE, Jul. 2018, pp. 1336–1342. doi: 10.1109/Cybermatics_2018.2018.00230.
  • [19] G. Kondova and J. Erbguth, “Self-sovereign identity on public blockchains and the GDPR,” in Proceedings of the ACM Symposium on Applied Computing, Association for Computing Machinery, Mar. 2020, pp. 342–345. doi: 10.1145/3341105.3374066.
  • [20] N. Naik and P. Jenkins, “Self-Sovereign Identity Specifications: Govern Your Identity through Your Digital Wallet using Blockchain Technology,” in Proceedings - 2020 8th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, MobileCloud 2020, 2020. doi: 10.1109/MobileCloud48802.2020.00021.
  • [21] Y. Liu, Q. Lu, H. Y. Paik, X. Xu, S. Chen, and L. Zhu, “Design Pattern as a Service for Blockchain-Based Self-Sovereign Identity,” IEEE Softw, vol. 37, no. 5, pp. 30–36, Sep. 2020, doi: 10.1109/MS.2020.2992783.
There are 21 citations in total.

Details

Primary Language English
Subjects Artificial Intelligence
Journal Section Research Articles
Authors

Aslı Bahce This is me 0000-0002-7669-2678

Semih Utku 0000-0002-8786-560X

Publication Date June 30, 2023
Submission Date April 24, 2023
Published in Issue Year 2023 Volume: 3 Issue: 1

Cite

IEEE A. Bahce and S. Utku, “A Case Study for Mobile Wallet Implementation in Self-Sovereign Identity Infrastructure”, Journal of Artificial Intelligence and Data Science, vol. 3, no. 1, pp. 1–16, 2023.

All articles published by JAIDA are licensed under a Creative Commons Attribution 4.0 International License.

88x31.png