Blockchain in IoT and Beyond: Case Studies …
119
Fig. 3 The Zero Knowledge
Proof (ZKP)
3.2.2
Decentralized Identity
Our digital identity is linked with the application, service, and device we are
involved with DIDs [26]. This makes the identity vulnerable to be misused because
it is managed by some centralized authority or third-party service provider. Each
individual has a privilege to a personality that they own and control.
Decentralized Identity fosters a greater level of control, trust, and security for apps,
IoT devices [27] as well as service providers. Privacy can be guaranteed by means
of pseudonymization [28]. So, instead of storing actual private data and information,
the things that are stored in the blockchain are:
• Public Decentralized Identifiers (Public DIDs) and associated DID Descriptor
Objects (DDOs) with verification keys and endpoints.
• Schemas
• Credential definitions
• Revocation registries
• Proofs of consent for data sharing
The concept of DIDs is credited to have been inspired from that of Uniform
Resource Names (URN) [29] and in specific from that of UUIDs. UUIDs are unique
identifiers that can be created locally. These are 128-bit values that can be used to
uniquely identify an entity in a system. The format of a URN has been specified by
RFC 8141 and can be commonly classified as: