118

A. Banerjee et al.

3.1

Role of Identity Management on Distributed Ledger

Technology in Internet of Things

Identity is document- or paper-based, which is prone to theft, loss, and fraud [20].

Digital identity allows us to access easily and swiftly between departments and

organizations. But it has an increasing risk of being hacked, compromised, leaked or

breached from the stored centralized server. So being digital is not enough. Digital

identities need to be private and secure.

3.2

Concepts Relating to Identity Management

Identity management can be done using zero knowledge proof, which is described in

Sect. 3.2.1, thus leading to decentralized identity management, which is described in

Sects. 3.2.2 and 3.2.3 discusses another important concept known as self-sovereign

identity.

3.2.1

Zero Knowledge Proof

Zero knowledge proof (ZKP) is the technique to enable data to be verified without

exposing the data. Therefore, ZKP has the power to control how the data is gathered,

processed, transacted, and shared. It uses a “verifier” and a “prover”. During the

transaction using ZKP, the prover attempts to prove something to the verifier without

informing the verifier of anything else about the thing.

ZKP must maintain three main properties:

a.

Completeness: When the statement is true, the honest verifier must ensure it by

an honest prover.

b.

Soundness: If the statement is false, the dishonest prover cannot prove it true

to an honest verifier besides some small chance of error.

c.

Zero-Knowledge: If the statement is true, no verifier will know anything about

it other than the fact that it is true.

Integrating the zero knowledge proof in blockchain-based IoT will pave the path

towards better interoperability [21], identity management, authentication, security

[22], and privacy [23].

Figure 3 shows the basic diagram of zero knowledge proof (ZKP) [24]. The zero

knowledge proof [25] is a method of identifying legitimate user without revealing

the identity of the user. The ZKF consists of three parts, first is ticket generator,

second is user and third is verifier, for example, if we go to movie or cinema hall we

purchase ticket. So, the counter is ticket generator, while purchasing ticket here we

generally don’t reveal our identity such as name, address or social security number.

The allowed to enter movie hall or cinema hall when this ticket is verified in the gate,

so, this is the verifier algorithm. This chapter gives ZKF for cloud security.