Model-Driven Security Analysis of Self-Sovereign Identity Systems

被引:0
|
作者
Ding, Yepeng [1 ]
Sato, Hiroyuki [1 ]
机构
[1] Univ Tokyo, Tokyo, Japan
关键词
self-sovereign identity; architectural pattern; security analysis; temporal logic; model checking; formal methods;
D O I
10.1109/TrustCom60117.2023.00230
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Best practices of self-sovereign identity (SSI) are being intensively explored in academia and industry. Reusable solutions obtained from best practices are generalized as architectural patterns for systematic analysis and design reference, which significantly boosts productivity and increases the dependability of future implementations. For security-sensitive projects, architects make architectural decisions with careful consideration of security issues and solutions based on formal analysis and experiment results. In this paper, we propose a model-driven security analysis framework for analyzing architectural patterns of SSI systems with respect to a threat model built on our investigation of real-world security concerns. Our framework mechanizes a modeling language to formalize patterns and threats with security properties in temporal logic and automatically generates programs for verification via model checking. Besides, we present typical vulnerable patterns verified by SecureSSI, a standalone integrated development environment, integrating commonly used pattern and attacker models to practicalize our framework.
引用
收藏
页码:1687 / 1694
页数:8
相关论文
共 50 条
  • [1] Self-sovereign identity
    Giannopoulou, Alexandra
    Wang, Fennie
    [J]. INTERNET POLICY REVIEW, 2021, 10 (02): : 1 - 10
  • [2] Is Self-Sovereign Identity Really Sovereign?
    Naik, Nitin
    Jenkins, Paul
    [J]. 2022 IEEE INTERNATIONAL SYMPOSIUM ON SYSTEMS ENGINEERING (ISSE), 2022,
  • [3] A Taxonomy of Challenges for Self-Sovereign Identity Systems
    Satybaldy, Abylay
    Ferdous, Md. Sadek
    Nowostawski, Mariusz
    [J]. IEEE ACCESS, 2024, 12 : 16151 - 16177
  • [4] Rezension „Self-Sovereign Identity“
    Jürgen Anke
    [J]. HMD Praxis der Wirtschaftsinformatik, 2023, 60 (2) : 514 - 516
  • [5] Analyzing and comparing the security of self-sovereign identity management systems through threat modeling
    Gruener, Andreas
    Muehle, Alexander
    Lockenvitz, Niko
    Meinel, Christoph
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 22 (05) : 1231 - 1248
  • [6] Analyzing and comparing the security of self-sovereign identity management systems through threat modeling
    Andreas Grüner
    Alexander Mühle
    Niko Lockenvitz
    Christoph Meinel
    [J]. International Journal of Information Security, 2023, 22 : 1231 - 1248
  • [7] Self-Sovereign Identity Model: Ethics and Legal Principles
    Luca Mattei
    Francesca Morpurgo
    Carmela Occhipinti
    Lorenzo Maria Ratto Vaquer
    Tetiana Vasylieva
    [J]. Digital Society, 2024, 3 (2):
  • [8] Sovrin: An Identity Metasystem for Self-Sovereign Identity
    Windley, Phillip J.
    [J]. FRONTIERS IN BLOCKCHAIN, 2021, 4
  • [9] Scalable Self-Sovereign Identity Architecture
    Misic, Jelena
    Misic, Vojislav B.
    Chang, Xiaolin
    [J]. IEEE NETWORK, 2022, 36 (03): : 114 - 121
  • [10] Self-Sovereign Identity for IoT Devices
    Kulabukhova, Nataliia
    Ivashchenko, Andrei
    Tipikin, Iurii
    Minin, Igor
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2019, PT II: 19TH INTERNATIONAL CONFERENCE, SAINT PETERSBURG, RUSSIA, JULY 1-4, 2019, PROCEEDINGS, PART II, 2019, 11620 : 472 - 484