Ajou University repository

Vulnerability Analysis of DID Document's Updating Process in the Decentralized Identifier Systems
  • Rhie, Min Hyung ;
  • Kim, Kyung Hoon ;
  • Hwang, Dong Yeop ;
  • Kim, Ki Hyung
Citations

SCOPUS

0

Citation Export

Publication Year
2021-01-13
Journal
International Conference on Information Networking
Publisher
IEEE Computer Society
Citation
International Conference on Information Networking, Vol.2021-January, pp.517-520
Keyword
AuthenticationBlockchainsControllersDecentralized IdentifiersSelf-Sovereign Identity
Mesh Keyword
Document updatingThird partiesVulnerability analysis
All Science Classification Codes (ASJC)
Computer Networks and CommunicationsInformation Systems
Abstract
In this paper, we analyzed the vulnerabilities that could occur when a third party who is not the owner of a Decentralized Identifier (DID) has the authority to modify a DID Document. DID is a technology that allows individuals to have data sovereignty. The DID Document contains information for authenticating the DID owner. A DID Controller has the authority to modify DID Document. This authority is being standardized so that it can be held by third parties as well as DID owners. It is a matter of changing the DID document against the will of the DID owner. To help owners assert their sovereignty even stronger, we propose a way for DID owners to use a policy, history, and service to verify the DID Document updating process.
ISSN
1976-7684
Language
eng
URI
https://aurora.ajou.ac.kr/handle/2018.oak/36694
https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85100714862&origin=inward
DOI
https://doi.org/10.1109/icoin50884.2021.9334011
Journal URL
http://www.icoin.org/
Type
Conference
Funding
This research was supported by Korea Institute for Advancement of Technology(KIAT) grant funded by the Korea Government(MOTIE) (P0008703, The Competency Development Program for Industry Specialist)
Show full item record

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Kim, Ki-Hyung  Image
Kim, Ki-Hyung 김기형
Department of Cyber Security
Read More

Total Views & Downloads

File Download

  • There are no files associated with this item.