University of Twente Student Theses

Login

Identification and Implementation of Suitable Decentralized Identifier Methods for Self-Sovereign Identity Wallets in a Data Space

Leander, Amadeus Darren (2024) Identification and Implementation of Suitable Decentralized Identifier Methods for Self-Sovereign Identity Wallets in a Data Space.

[img] PDF
2MB
Abstract:The Dataspace Protocol was recently released to the public by the International Data Spaces Association as a standardized technical specification to tackle rising interoperability issues among participants within the same and across different data spaces, complementing the functional components of data spaces outlined in the Reference Architecture Model (IDS-RAM). Despite this, this protocol only provides guidelines solely for the data exchange process through the IDS Connector component and does not touch upon other essential components described in the IDS-RAM. Ongoing efforts currently exist to define a similar protocol for the Identity Provider component and to introduce a decentralized identity management system within a data space. This overall thesis study aims to contribute to these existing processes by exploring the suitability of Decentralized Identifiers (DIDs) in a Self-Sovereign Identity (SSI) wallet for the domain of data spaces. The study begins with performing a collection of commonly supported DID methods from different IDS Connector implementations and independent SSI wallets by surveying technical documentations and version control systems. Afterwards, an evaluation rubric following W3C recommendations is constructed by selecting criteria relevant to the context of data spaces identity management. With these prepared artefacts, each of the gathered DID methods are evaluated individually using the generated evaluation rubric, of which the results are compared against each other to decide their applicability in the domain of this study. This comparison process draws out one candidate DID method deemed most suitable for the data spaces context. Finally, a validation is conducted by integrating the selected DID method to an existing data space SSI wallet, and different scenarios encompassing interoperability, security and usability are conducted to measure its actual fit and appropriateness.
Item Type:Essay (Master)
Faculty:EEMCS: Electrical Engineering, Mathematics and Computer Science
Subject:54 computer science
Programme:Computer Science MSc (60300)
Link to this item:https://purl.utwente.nl/essays/103725
Export this item as:BibTeX
EndNote
HTML Citation
Reference Manager

 

Repository Staff Only: item control page