Land Registry Framework Based on Self-Sovereign Identity (SSI) for Environmental Sustainability
Abstract
:1. Introduction
- To compare the current SSI solution with the principles of SSI;
- To identify the steps and requirements for the SSI adoption;
- To identify the components of SSI to comply with the principles of SSI;
- To discuss the applications of SSI in land registry and design a framework for the SSI-based land registry system.
2. Background
2.1. Land Registry System
- Land Registry Process
- The land documentation is submitted to the jurisdiction in which the property is located. The approved seller and buyer signatures must be displayed, including witnesses for the agreement between seller and buyer.
- Payment receipt/proof shall be shown to the Sub-Registrar along with the Property Paper.
- The buyer and seller should provide proof of identification to the authorities involved in the land registration.
- If a third party is involved during a property contract, the representative must bring the authorized registration documents, such as a letter of authorization or legal authority, under various country laws.
- The authority has the right to refuse the registration process and registration papers for inconsistencies.
- B.
- Limitations in the current land registry system
- High time complexity: In the traditional land registry process, the transaction between the involved parties (sellers, buyers, banks and real estate agents) is time-consuming and expensive. The process for the trading of land in real estate includes various logical steps such as housing assessment and collection of documents. A complete property document depends upon completing the main contract, transfer of money, and registration, which makes the overall process more complex [28]. In [36], the authors discussed that the Swedish land registry system usually takes more time starting from the purchase contract signed for sale up to the actual transfer of the property [10,37,38]. Furthermore, in the Swedish land registry system, the absence of officials in the land transaction reduces the transparency and trust of the system [39,40,41].
- Physical property site visit and verification: The involved parties for land transactions first conduct a historical verification for each other. The buyer checks the physical location and coordinates of the property, history, and previous loan details on the property. This verification process is carried out manually, making the process more complicated and making the system vulnerable to fraud and loss of information [10,45]. In Kosovo, the verification of the land property and relevant documents is carried out only by the request of the notary service [43,44].
- More cost: The cost required to perform a transaction includes the cost of negotiation, signing, supervisory activity, and contract execution [46,47,48,49]. It signifies that the changes in the transaction cost will affect the housing affordability for Canadian citizens [46]. The transaction cost is due to the information asymmetry regarding the hidden cost for the objects in real estate [28,50] and regulations [38,51,52,53,54].
- Vulnerable to error: The nation of Honduras made a law based on the property to create a general legal framework and enhanced land administration. Additionally, changes are making the system institutionalized for land registry SINAP, which facilitates the platform for the country’s legal registry system [45,55]. Unluckily these frameworks are vulnerable to manipulation, including land title fraud. Moreover, it creates concern about the reliability of information for the Honduras land registry system [56]. The paper-based system is hard to access and also valuable for human-made or natural disasters [44].
- Corruption and fraud: The traditional land registry process is centralized, which makes corruption and fraud more likely [38,48]. The centralized nature of authorities in the land registry makes corruption and fraud easier [42,57]. Based on the various reports, Canada’s real estate market has severe problems with fraud. The currently used process of the closed binding system makes it difficult to prove the fraud by brokers in the land registration process [58]. Among the other fraud in the Canadian real estate market, the most severe problem is title fraud, which victimizes financially [46,59].
- Less secure: The use of trustless ledger technology will change the property law and lower the price to release disorderly and scalable applications. Currently, the property registry is a mixture of almost inaccurate, insecure, and expensive ledgers [41]. The centralized architecture of the application raises concerns regarding the attack on the system and corruption, which makes the system untraceable [28,43].
- Complex process: The procedure for the sale of the property requires many logical steps such as the collection of documents, assessment of property, signing of the primary contract, registration, and transfer of money, which makes the process more complex [28]. The land registry system forces the involved parties (buyer, real estate agents, and banks) to create a separate complex red tape process for agreement [36].
- Lack of transparency: The current land registry process lacks transparency for the transaction, such as leasing, purchasing, and sale. Although the current land registry system fails to achieve the confidential and authenticity of the data [52,53], the trading of property is troubled to become an essential liquid asset that includes hidden costs, regulations, financial assurance, and public accountability. Moreover, it also risks the rights of an individual user [10,37,50,51,56]. In the Kosovo Cadastral system, information on land ownership data is only accessible to the notaries, lawyers, and intermediaries [44]. The official in the Swedish land registry is the more trusted authority in the process. Their absence in the earlier phase of the land transaction causes a lack of transparency and trust [36,42].
- Third-party involvement: In the traditional land registry process, there are lots of entities involved during the transaction, such as brokers, land inspectors, attorney, notaries, and government authority, which results in unnecessary cost, complexity and delay in the process [28,48,52,53]. All the parties involved in the land transaction process have to trust the third party, which results in fraud related to ownership of title and the validity of ownership title [37,38,45,46,57,58,60].
- Less reliability: In the traditional land registry system, obtaining reliable information is challenging for investors. Additionally, the political person may restrict investors from gaining reliable information due to the closure of government offices or the abolishment of the government. The lack of reliable information influences the financial flow and ownership transfer that is required to acquire the piece of land [56].
- Authenticity issue: The nation of Honduras introduced a new law on the property by creating a legal framework to improve land administration. Unfortunately, this framework is unsafe for manipulation, which results in land title fraud. Moreover, there are concerns related to the authenticity of the Honduras land registration [56].
- Lack of effectiveness: The real estate market affects the country’s economy. Lack of effectiveness in the real estate market causes various transparency problems like more transaction costs, delays in the process, and prejudice [44].
- Paper-based process: The respective department manually stores the land transaction records on paper. However, the departments are currently upgrading from paper-based storage to computerized systems [28,39]. However, unfortunately, the documents that prove the land title ownership are still stored on paper, making the real estate system more complicated and time-consuming [42].
- Lack of trust: There is a lack of trust in the property verification process by the board of revenue. The sale deed is verified and then forwarded to another department, leading to a lack of trust [43]. Double spending is a major concern of trust in the system. When the buyer spends currency multiple times for the same property, they cannot trust the payment system of the land registry [41,60,61]. No statistics are available in the Kosovo Cadastral system related to the real estate transaction. However, there is no compensation mechanism for covering the loss that occurred due to the inaccurate information provided by the immovable property register, which results in a lack of trust in the system [44]. In the Swedish land registry (Lantmäteriet), officials are the most trusted actor in the land registry. Their absence in earlier phases of land transaction results in a lack of trust and transparency [39,40].
- Ownership issue: The present land registry system in Sri Lanka has issues like a large number of land disputes, lawsuits, unclear ownership over land encroachment, and misuse of land [62]. The ownership of the land title is not guaranteed. Many users claim ownership for the same land title [37,43,57,61].
- C.
- Land Registry and Identity issues
2.2. Self-Sovereign Identity (SSI)
- Existence: Users have an independent existence and are not dependent on the details found in their digital identifiers.
- Control: Users have full control their identities and be able to transform, update, refer and hide them. Users have full authority to disclose or choose privacy on their identity details.
- Access: Individuals should have access to their data and should have the ability to be able to retrieve it when necessary.
- Transparency: Systems and algorithms used to handle and run digital identities must be accessible and transparent. The public must be able to track the operation and maintenance of the system.
- Persistence: The identity must be long-lived, and the individual’s identity must be preserved for as long as the individual wants.
- Portability: Information and resources concerning identity must be transportable, and not owned by a single third party, even though they are trusted.
- Interoperability: Identities are available for common use in all contexts instead of being limited to one siloed environment.
- Consent: Individuals should give consent to use their identities. The data sharing by third parties must occur with the consent of the data subject.
- Minimization: The disclosure of claims should be kept to a minimum and should only be disclosed when necessary to perform a task.
- Protection: The individual‘s right to privacy must be protected at all costs, even though this would go against the identity providers’ interests.
2.3. Comparison of Self-Sovereign Identity Solutions on the SSI Principle
2.3.1. uPort
2.3.2. Sovrin
2.3.3. Civic
2.3.4. ShoCard
2.4. Steps and Requirements for SSI Adoption
3. SSI Compliance
3.1. Components of SSI
3.1.1. Decentralized Identifiers (DIDs)
- DID Documents: The DID refers to the DID document that provides specific information about the authentication mechanisms to prove the DID, endpoints, and other attributes.
- DID Registries: The number of DID implementations with DIDs is required to have a DID registry. Due to the decentralized existence of DIDs, centralized and autonomous DID registries are not feasible. DID registries are intended to act as identifiers for a variety of purposes.
- DID Methods: The DID standard is made using DID methods. DID methods differ concerning the mechanisms for establishing and validating DIDs, the authentication systems. Currently, there is no officially recognized list of DID methods available. However, the World Wide Web Consortium (W3C) and Digital identity function (DIF) maintain unofficial lists.
3.1.2. Verifiable Credentials (VCs)
- Credential Registry Exchange: There are three methods for exchanging credentials. In the first instance, the credential is sent from the issuer to the holder. Secondly, the credential is passed from the requester to the holder. Finally, the credential is transmitted from the holder to the verifier. It is essential that the credential exchange between the credential repository (i.e., the digital wallet) and the service that creates or utilizes the credential be secured.
- Revocation: Credentials represent the individual’s status and can be revoked or suspended at the consent of the person who holds them. A specific guideline seems fundamental when revoking a credential and modifying the credential status.
3.1.3. Verifiable Presentations (VPs)
- Selective Disclosure Mechanisms and Zero-Knowledge Proofs (ZKP): In self-sovereign identification systems, individuals regulate both their identities and credentials. Therefore, they have the right to present themselves and decide on how many details they should share. They have multiple verifiable credentials provided by various issuers and they build a presentation with explicit statements from such credentials so that it may not disclose any other claims included in it.
- Traceability and Monitoring: The sharing of credentials takes place off-chain, which means that the credential is not registered. Verification of the certificate ensures that there is no traceable record of the transaction. This helps to reduce data privacy issues. However, in certain situations, the sharing and verification of credentials are supposed to be transparent. It is mainly the case when measuring and providing feedback on solutions is essential.
3.1.4. Digital Repositories and Wallets
- Key Recovery: The first layer to establish a digital identity contains a private key and an authenticator. It protects the users from unexpected events and inappropriate uses of their identifiers and credentials. Therefore, it is essential to ensure digital wallets’ recovery due to the loss or misuse of digital wallets.
- Recovery of Credentials: A digital wallet allows for storing and managing digital credentials. If the wallet is lost or passwords are compromised, it is possible to retrieve the password using a digital wallet. Essential recovery methods should be in place to back up credentials in both cloud and offline computers. For example, cloud back-ups or other back-ups facilitated by the wallet provider should describe how or when the users can retrieve the credentials. The recovery process of credentials must be a balance between usability and security.
3.1.5. Identity Proofing, Authentication, and Authorization
- Identity Proofing: The identity proofing process begins with the requesting entity requesting identity credentials. Next, the identity issuer authenticates the user’s identity. The customer then receives a digital identity certificate from the issuer. Finally, the credential is saved in the secure repository.
- Authentication: Authentication is dependent on three distinct factors: firstly, the password, which is essential; secondly, the user’s credentials, which can include a mobile, ID card, or cryptographic key; and thirdly, the use of biometric data sources such as fingerprints.
- Authorization: When applying for a service, the service provider shall check that the credential issued is legitimate. The issuer is acknowledged, and the presenter is authorized to request the credential. When a verifiable certification is issued, two different behaviors toward providing certificates are observed: Authorization for the Presenter and Authorization of Purpose.
3.1.6. Certificate Authorities (CAs and Trusted Lists (TLs)
3.1.7. Distributed Ledger Technology (DLT)
- Permissionless: Permissionless DLT allows users to access the network at any time, such as Bitcoin and Ethereum. Many networks use cryptographic technology. They have access to the system, but with high transaction fees and anonymity, every individual is anonymous.
- Permissioned private: Permissioned DLT consists of a finite network of well-defined identities that deploy, run, and manage all nodes. Generally, such networks are developed and managed by a blockchain provider.
- Permissioned public: Permissioned public access to the network provides participants with access to the network and asks whether they comply with specific laws and regulations. Publicly accessible networks are open, transparent, decentralized and do not require any fees. At the same time, the identity of everyone guarantees not only anonymity but also regulatory compliance.
3.2. SSI Framework and Component Architecture
3.3. Components of SSI in Compliance with SSI Principles
3.3.1. Control
- DPKI: Decentralized public key infrastructure (DPKI) does not require a centralized authority to create keys for actors since actors themselves create them in a decentralized manner. The DID holder has a private key that allows them to control their DID [93,94]. User keys are generated on the client side without relying on a central authority.
- Asymmetric cryptography authentication protocol: Zero-knowledge proof of asymmetric cryptography protocol enables the identity owner to prove the identity ownership by using the private key stored on the blockchain. Most SSI systems use the asymmetric cryptography authentication protocol for authentication [93].
3.3.2. Access
3.3.3. Transparency
3.3.4. Persistence
- Time-revocation: expired part of the credential data.
- Revocation list: Mapping the credential ID with the revocation list.
- Proof of non-revocation: ZKP of a credential that has not been revoked is contained in Hyperledger Indy.
3.3.5. Portability
3.3.6. Interoperability
- JSON-LD: The DID documents are developed using the JSON-LD. The JSON-LD will share data in a consistent format that can be understood by both systems [98].
- Universal resolver: A community-based project of the “Decentralized Identifier Foundation” (DIF) was formed to develop a universal resolver to create an interoperable system. It can resolve any DID form on the underlying ledgers of any DID method that can be used to resolve the DID method in the SSI ecosystem. It offers details regarding DIDs recorded with the DID method based on the DID. DID methods are linked with each other to make cross-border interactions easier. One of the most important parts of interoperability is DKMS, which describes how DIDs interact with one another and the ledger. It also offers useful tools for key management, such as key recovery [99].
- DID Auth protocol: This utilizes open standard, Secure Quick Reliable Login (SQRL) and the Web Auth protocol that present the challenge of authenticating the user. The standardizing of specifications using open standardizing using SQRL will ensure all DIDs perform according to the designed specifications and enable interoperability [93,94].
3.3.7. Consent
- Verifiable credential: This allows users to save their identity credentials in wallets installed on personal devices and make them accessible via the Internet. It provides the user with full control and consent of the credentials stored in the wallet so that users can also choose with whom to share information and how long the information can be shared [89].
3.3.8. Existence
- Decentralized identifiers are persistent, ensuring that the holder is authenticated to be cryptographically secure if the private key is present with the identity holder [94]. The domain also has several services, including a website and an agent service. The identity holder will probably have multiple data points, such as a mailing address, telephone number, or other information which might be used to develop a relationship [100].
- Verifiable presentation: A verified credential contains evidence of authenticity from the identity issuer. It enables the identity issuer to verify the identity owner digitally [89]. A verified presentation is made by the identity owner and eventually will be forwarded to the verifier who verifies it.
- Multiple identifiers: An identity owner may obtain multiple identifiers and build a new identity when required. The ID claims may not depend on an identifier. The identifiers and credentials will continue to be separate. It impacts the combination of credentials with any identifier. Additionally, the DID will be shared with the verifier whenever necessary.
- Anonymous credentials: The identity owner who gives the verifier credentials does not wish to reveal his ID. Alternatively, identity ownership is shown in a one-way using zero-knowledge proof [97].
3.3.9. Minimalization
3.3.10. Protection
- Pairwise-pseudonymous DIDs: These preserve privacy by preventing the linkage of identities. Whenever two services want to analyze their users’ interests, the better solution is to compare a DID, which only recognizes a particular connection. Additionally, there is only one information service provider that will be stored in the DID. However, the file’s information is difficult to trace as it is not assigned to a user’s account. The pairwise pseudonym DID, with public and private keys, is created on the user side [94].
- Verifiable presentations: The system promises enhanced privacy and balances individual integrity using ZKP cryptography techniques by verifying proof of one’s identity without revealing actual private information [89].
4. Self-Sovereign Identity (SSI) and Land Registry
- User sovereignty: Self-sovereign identification systems that use cryptographic signatures, pairwise connections, and digital identities provide the user with complete control over his identity data. SSI enables the user or a group of users to be linked to assets, enhancing the capabilities and scope of land registration. Furthermore, the challenges of validating and transferring identity information will evolve to give verified credentials and maintain the remaining registry components that do not benefit from Self-sovereign identity.
- Enhancing access to financial assistance: It also eases the financial assistance for people in poor nations through the use of SSI land registries. According to Inter-American Development Bank financial market analysts, Juan Antonio Ketterer and Gabriela Andrade, “transparent and more accurate asset registrations as collateral could eliminate knowledge-related asymmetry obstacles and provide financial access” [115]. Recent US initiatives suggest that mobile assets could help small and medium-sized firms expanded faster [116].
- Real estate market efficiency: Identifying participants is critical to reducing the likelihood of fraud in real estate markets, which leads to inefficiencies and higher transaction fees. A self-sovereign identification system can legally bind and securely link digital signatures to their owners, enabling trusted and transparent online functioning.
- Post-conflict land ownership: legal re-establishment of land ownership for refugees and internally displaced persons (IDPs) can aid in the restoration of a country’s economy after a conflict has ended. However, the restoration procedure is complex since many refugees lack vital land records or are afraid of the consequence of claims [117]. In the absence of a competent property register, SSI collects land ownership documents and receives valid credentials from an NGO to assist in registering a claim [118].
- Disaster preparedness: In the event of a natural disaster, land ownership is critical for disaster preparedness and recovery. There are innovative techniques that have been incorporated into new disaster preparedness strategies. By incorporating the SSI in the land registry, users will benefit from an improved system to prove their land ownership and requesting assistance and restoration grants. Alternatively, decentralizing record administration will ensure that land ownership records are preserved. The usage of biometrics in SSI can help people authenticate their identities and access permitted services even if their documents are deleted or otherwise misplaced.
5. SSI-Based Land Registry Framework
5.1. Phases of Land Registration System Using SSI
5.1.1. Roles and Relationships
- ▪
- The subject/owner plays a key role in the exchange of verifiable credentials.
- ▪
- The issuer is the agent (individual or organization) responsible for creating the verifiable credential, such as the land registry department, bank, surveyor and revenue department.
- ▪
- The verifier/relying party, when a buyer receives a verifiable credential, he or she is often interested in verifying its authenticity.
- ▪
- A verifiable data registry (ledger) is a system that keeps track of data needed to verify a credential.
5.1.2. Scenario 1: Registration Phase
5.1.3. Scenario 2: Pre-Agreement and Verification
5.1.4. Scenario 3: Bank Fund Transfer and Certificate Generation
6. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Windley, P.; Reed, D. SovrinTM: A Protocol and Token for Self-Sovereign Identity and Decentralized Trust; Sovrin Foundation: Provo, UT, USA, 2018; Available online: https://sovrin.org/wp-content/uploads/Sovrin-Protocol-and-Token-White-Paper.pdf (accessed on 1 August 2020).
- World Bank. ID4D 2018 Global Dataset; World Bank Group: Washington, DC, USA, 2018; Available online: https://id4d.worldbank.org/global-dataset (accessed on 21 December 2020).
- Idrees, S.; Nowostawski, M. Transformations through Blockchain Technology; Springer: Berlin/Heidelberg, Germany, 2022. [Google Scholar]
- Toaha, M.; Khan, S. Automated digital archive for land registration and records. In Proceedings of the 11th International Conference on Computer and Information Technology, Khulna, Bangladesh, 24–27 December 2008; pp. 46–51. [Google Scholar] [CrossRef] [Green Version]
- Rahman, A.; Hossain, R. The uncomfortable truth about land disputes in Bangladesh: Insights from a household survey. Land Use Policy 2020, 95, 104557. [Google Scholar] [CrossRef]
- Rabbani, M.; Hossain, F. Digitisation of land administration. The Daily Star, 28 November 2019. [Google Scholar]
- Antonio, T.; Lilyana, P. Directive (EU) 2018/843 of the European parliament and of the council. Off. J. Eur. Union 2018, 2018, 32. [Google Scholar]
- Aslam, T.; Maqbool, A.; Akhtar, M.; Mirza, A.; Khan, M.A.; Khan, W.Z.; Alam, S. Blockchain based enhanced ERP transaction integrity architecture and PoET consensus. Comput. Mater. Contin. 2022, 70, 1089–1109. [Google Scholar] [CrossRef]
- Andrew, S.; Andrew, B. The Future of Real Estate Transactions. 2019. Available online: https://www.sbs.ox.ac.uk/sites/default/files/2019-03/FoRET-ReportSummary_0.pdf (accessed on 2 April 2022).
- Krupa, K.S.; Akhil, M.S. Reshaping the Real Estate Industry Using Blockchain. In Lecture Notes in Electrical Engineering; Springer: Singapore, 2019; Volume 545, pp. 255–263. [Google Scholar]
- Graglia, J.M.; Mellon, C. Blockchain and Property in 2018: At the End of the Beginning. Innov. Technol. Gov. Glob. 2018, 12, 90–116. [Google Scholar] [CrossRef]
- Idrees, S.M.; Nowostawski, M.; Jameel, R.; Mourya, A.K. Security aspects of blockchain technology intended for industrial applications. Electronics 2021, 10, 951. [Google Scholar] [CrossRef]
- Bouras, M.A.; Lu, Q.; Zhang, F.; Wan, Y.; Zhang, T.; Ning, H. Distributed Ledger Technology for eHealth Identity Privacy: State of The Art and Future Perspective. Sensors 2020, 20, 483. [Google Scholar] [CrossRef] [Green Version]
- Shuaib, M.; Hassan, N.H.; Usman, S.; Alam, S.; Bhatia, S.; Mashat, A.; Kumar, A.; Kumar, M. Self-Sovereign Identity Solution for Blockchain-Based Land Registry System: A Comparison. Mob. Inf. Syst. 2022, 2022, 8930472. [Google Scholar] [CrossRef]
- Stokkink, Q.; Pouwelse, J. Deployment of a Blockchain-Based Self-Sovereign Identity. In Proceedings of the 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Halifax, NS, Canada, 30 July–3 August 2018; pp. 1336–1342. [Google Scholar] [CrossRef] [Green Version]
- European Commission. Trends in Electronic Identification: An Overview; European Commission: Brussels, Belgium, 2018. [Google Scholar]
- ESSIF. European Self-Sovereign Identity Framework; European Commission: Den Haag, The Netherlands, 2021. [Google Scholar]
- Der, U.; Jahnichen, S.; Sürmeli, J. Self-sovereign Identity $-$ Opportunities and Challenges for the Digital Revolution. arXiv 2017, arXiv:1712.01767. [Google Scholar]
- Baars, D. Towards Self-Sovereign Identity Using Blockchain Technology; University of Twente: Twente, The Netherlands, 2016. [Google Scholar]
- Coelho, P.; Zúquete, A.; Gomes, H. Federation of Attribute Providers for User Self-Sovereign Identity. J. Inf. Syst. Eng. Manag. 2018, 3, 32. [Google Scholar] [CrossRef] [Green Version]
- Muhle, A.; Gruner, A.; Gayvoronskaya, T.; Meinel, C. A survey on essential components of a self-sovereign identity. Comput. Sci. Rev. 2018, 30, 80–86. [Google Scholar] [CrossRef] [Green Version]
- Allen, C. The path to self-sovereign identity. Coin Desk. 25 April 2016. Available online: http://www.lifewithalacrity.com/2016/04/the-path-to-self-soverereign-identity.html (accessed on 18 May 2020).
- Lundkvist, C.; Heck, R.; Torstensson, J.; Mitton, Z. Uport: A Platform for Self-Sovereign Identity; Blockchainlab: London, UK, 2016. [Google Scholar]
- Civic Technologies Inc. Civic Whitepaper. 2017. Available online: https://tokensale.civic.com/CivicTokenSaleWhitePaper.pdf (accessed on 13 January 2021).
- Ali, M.; Shea, R.; Nelson, J.; Freedman, M.J. Blockstack: A New Internet for Decentralized Applications. Doylestown, United States. 2017. Available online: https://github.com/stacksgov/stacks-co (accessed on 2 August 2020).
- SelfKey Foundation. Self-Sovereign Identity for more Freedom and Privacy—SelfKey. Selfkey. September 2017. Available online: https://selfkey.org/ (accessed on 13 April 2020).
- Ebrahimi, A. Identity management verified using the blockchain. ShoCard, Tech. Rep. 2019. Available online: https://shocard.com/wp-content/uploads/2019/02/ShoCard-Whitepaper-2019.pdf (accessed on 22 April 2020).
- Mehendale, D.K.; Masurekar, R.S.; Patil, H.V. Implications of Block Chain in Real Estate Industry. Int. J. Recent Technol. Eng. 2019, 8, 500–503. [Google Scholar]
- Graglia, M.; Mellon, C.; Robustelli, T. The Nail Finds a Hammer Self-Sovereign Identity, Design Principles, and Property Rights in the Developing World. New America Weekly, 17 October 2018; p. 93. [Google Scholar]
- Senturk, S. Future of property rights: Self-Sovereign Identity and Property Rights. New America Weekly, 12 June 2019; p. 2. [Google Scholar]
- Shang, Q.; Price, A. A Blockchain-based Land Titling Project for the Republic of Georgia. Innovations 2018, 12, 72–78. [Google Scholar] [CrossRef] [Green Version]
- Piore, A. Can Blockchain Finally Give Us The Digital Privacy We Deserve? Newsweek 2019, 172, 1–16. Available online: http://ezproxy.library.yorku.ca/login?url=https://search.proquest.com/docview/2185863710?accountid=15182 (accessed on 14 November 2021).
- Dobhal, A.; Regan, M.; Property, M.R.; Dobhal, M.; Regan, A. Immutability and Auditability: The Critical Elements in Property Rights Registries. In Proceedings of the Annual World Bank Conference on Land and Property, Washington, DC, USA, 15 March 2016; pp. 1–8. [Google Scholar]
- Oliveira, E. Land Ownership and Land Use Development: The Integration of Past, Present, and Future in Spatial Planning and Land Management Policies. Landsc. J. 2017, 36, 119–121. [Google Scholar] [CrossRef]
- Kalkuhl, M.; Milan, B.F.; Schwerhoff, G.; Jakob, M.; Hahnen, M.; Creutzig, F. Fiscal Instruments for Sustainable Development: The Case of Land Taxes; Munich Personal RePEc Archive: Munich, Germany, 2017. [Google Scholar]
- Kempe, M. The Land Registry in the Blockchain. 2016. Available online: http://ica-it.org/pdf/Blockchain_Landregistry_Report.pdf (accessed on 5 November 2020).
- Kumar, P.; Dhanush, G.A.; Srivatsa, D.; Nithin, A.; Sahisnu, S. A Buyer and Seller’s Protocol via Utilization of Smart Contracts Using Blockchain Technology. In Communications in Computer and Information Science; Springer: Singapore, 2019; Volume 1075, pp. 464–474. [Google Scholar]
- Themistocleous, M. Blockchain technology and land registry. Cyprus Rev. 2018, 30, 195–202. [Google Scholar]
- McMurren, J.; Young, A.; Verhulst, S. Addressing Transaction Costs Through Blockchain and Identity in Swedish Land Transfers. Boston, MA, USA. October 2018. Available online: https://blockchan.ge/blockchange-land-registry.pdf (accessed on 1 August 2020).
- Idrees, S.M.; Aijaz, I.; Jameel, R.; Nowostawski, M. Exploring the Blockchain Technology: Issues, Applications and Research Potential. Int. J. Online Biomed. Eng. 2021, 17, 48–69. [Google Scholar] [CrossRef]
- Fairfield, J.A.T. BitProperty. S. Cal. L. Rev. 2015, 88, 805. [Google Scholar]
- Mukne, H.; Pai, P.P.S.R.; Raut, S.; Ambawade, D. Land Record Management using Hyperledger Fabric and IPFS. In Proceedings of the 2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT), Kanpur, India, 6–8 July 2019; pp. 1–8. [Google Scholar] [CrossRef]
- Abhishek, G. Property Registration and Land Record Management via Blockchains; Indian Institute of Technology Kanpur: Kanpur, India, 2019. [Google Scholar]
- Hoxha, V.; Sadiku, S. Study of factors influencing the decision to adopt the blockchain technology in real estate transactions in Kosovo. Prop. Manag. 2019, 37, 684–700. [Google Scholar] [CrossRef]
- Raquel Benbunan, F.; Arturo, C. Digitization of Land Records: From Paper to Blockchain. In Proceedings of the International Conference on Information Systems 2018, ICIS 2018, San Francisco, CA, USA, 13–16 December 2018; Volume 2, pp. 1–9. Available online: https://www.researchgate.net/publication/329222337 (accessed on 17 May 2020).
- Mashatan, A.; Roberts, Z. An enhanced real estate transaction process based on blockchain technology. AMCIS 2017 Am. Conf. Inf. Syst. A Tradit. Innov. 2017, 2017, 1–5. [Google Scholar]
- Taxation Researcher. Buying Property in Mexico|How To Buy a House in Mexico. Global Property Guide; Maxico, North America, 2020; pp. 1–8. Available online: https://www.globalpropertyguide.com/Latin-America/Mexico/Buying-Guide (accessed on 2 April 2022).
- Kalyuzhnova, N. Transformation of the real estate market on the basis of use of the blockchain technologies: Opportunities and problems. In Proceedings of the MATEC Web of Conferences, Irkutsk, Russia, 26–27 April 2018; Volume 212, p. 6004. [Google Scholar] [CrossRef]
- Xie, Z.; Yin, J.; Guo, J. The research of transaction costs between real estate developers and their partners. In Proceedings of the 2nd International Conference on Logistics, Informatics and Service Science LISS 2012, Beijing, China, 3 January 2013; Springer: Berlin/Heidelberg, Germany, 2013; pp. 1151–1156. [Google Scholar] [CrossRef]
- Miller, N.; Pogue, D. Sustainable real estate and corporate responsibility. In Routledge Handbook of Sustainable Real Estate, 1st ed.; Wilkinson, S.S.S., Dixon, T., Miller, N., Eds.; Routledge: Abingdon, UK, 2018; pp. 19–36. [Google Scholar]
- Cerutti, E.; Dagher, J.; Dell’Ariccia, G. Housing finance and real-estate booms: A cross-country perspective. J. Hous. Econ. 2017, 38, 1–13. [Google Scholar] [CrossRef] [Green Version]
- Danielsen, B.; Harrison, D. Liquidity, Accounting Transparency, and teh Cost of Capital: Evidence from Real Estate Invetment Trusts. J. Real Estate 2014, 36, 212–252. [Google Scholar]
- Norta, A.; Fernandez, C.; Hickmott, S. Commercial Property Tokenizing With Smart Contracts. In Proceedings of the 2018 International Joint Conference on Neural Networks (IJCNN), Rio de Janeiro, Brazil, 8–13 July 2018; pp. 1–8. [Google Scholar] [CrossRef]
- Kaplanov, N.M. Nerdy Money: Bitcoin, the Private Digital Currency, and the Case Against Its Regulation. SSRN Electron. J. 2012, 25, 1–65. [Google Scholar] [CrossRef] [Green Version]
- Dobhal, A.; Property, M.R. Immutability and Auditability: The Critical Elements in Property Rights Registries. Annu. World Bank Conf. L. 2018, 1–20. [Google Scholar]
- Lemieux, V.L. Evaluating the Use of Blockchain in Land Transactions: An Archival Science Perspective. Eur. Prop. Law J. 2017, 6. [Google Scholar] [CrossRef]
- Thakur, V.; Doja, M.N.; Dwivedi, Y.K.; Ahmad, T.; Khadanga, G. Land records on Blockchain for implementation of Land Titling in India. Int. J. Inf. Manag. 2020, 52, 1–9. [Google Scholar] [CrossRef]
- Malik and T. Foxcroft Real estate agents caught breaking the rules on Marketplace’s hidden camera. CBC News. 3 November 2016. Available online: https://www.cbc.ca/news/business/real-estate-agents-caught-breaking-the-rules-on-marketplace-s-hidden-camera-1.3825841 (accessed on 2 April 2020).
- Myrick, C. Top 6 Real Estate Scams-and How to Avoid Them. The Globe and Mail. 9 August 2018. Available online: https://www.theglobeandmail.com/real-estate/mortgages-and-rates/top-6-real-estate-scams-and-how-to-avoid-them/article13108985 (accessed on 2 April 2020).
- Shenderovich, E.; Sarva, A. The Blockchain Network of Commercial Real Estate; Baya: Carlsbad, CA, USA, 9 August 2019; pp. 1–18. [Google Scholar]
- Agarwal, B. Conclusive Land Title System for India; Panjab University: Chandigarh, India, 2018. [Google Scholar]
- Fernando, D.; Ranasinghe, N. Permissioned Distributed Ledgers for Land Transactions; A Case Study. Lect. Notes Bus. Inf. Process. 2019, 361, 136–150. [Google Scholar] [CrossRef]
- Alam, S.; Shuaib, M.; Khan, W.Z.; Garg, S.; Kaddoum, G.; Hossain, M.S.; Bin Zikria, Y. Blockchain-based Initiatives: Current state and challenges. Comput. Netw. 2021, 198, 108395. [Google Scholar] [CrossRef]
- Maza, M.V. El auge de blockchain y sus posibilidades reales de aplicación en los registros de las administraciones públicas. IDP Rev. Internet Derecho Y Política 2019, 28, 109–126. [Google Scholar] [CrossRef]
- Kaczorowska, M. Blockchain-based Land Registration: Possibilities and Challenges. Masaryk Univ. J. Law Technol. 2019, 13, 339–360. [Google Scholar] [CrossRef] [Green Version]
- Sylvester, G. E-Agriculture in Action:Blockchain for Agriculture Opportunities and Challanges, 2018th ed.; Food and Agriculture Organization of the United Nations and the International Telecommunication Union: Bangkok, Thailand, 2019. [Google Scholar]
- Ekmekci, H.S. Applicability of Blockchain Technology to Turkish Land Registry System. Master’s Thesis, Tilburg University, Tilburg, The Netherlands, 2019. [Google Scholar]
- Mintah, K.; Baako, K.T.; Kavaarpuo, G.; Otchere, G.K. Skin lands in Ghana and application of blockchain technology for acquisition and title registration. J. Prop. Plan. Environ. Law 2020, 12, 147–169. [Google Scholar] [CrossRef]
- Yapicioglu, B.; Leshinsky, R. Blockchain as a tool for land rights: Ownership of land in Cyprus. J. Prop. Plan. Environ. Law 2020, 12, 171–182. [Google Scholar] [CrossRef]
- Mehdi, N. Blockchain: An Emerging Opportunity for Surveyors? RICS Insight: London, UK, 2020; Available online: https://www.rics.org/globalassets/blockchain_insight-paper.pdf (accessed on 2 April 2020).
- Konashevych, O. Constraints and benefits of the blockchain use for real estate and property rights. J. Prop. Plan. Environ. Law 2020, 12, 109–127. [Google Scholar] [CrossRef]
- Krigsholm, P.; Ridanpaa, K.; Riekkinen, K. Blockchain as a Technological Solution in Land Administration-What are Current Barriers to Implementation? FIG Peer Rev. J. 2019, XV, 14–22. Available online: https://www.fig.net/resources/proceedings/fig_proceedings/fig2019/papers/ts08i/TS08I_krigsholm_ridanpaeae_et_al_9829.pdf (accessed on 17 February 2022).
- Liu, Y.; He, D.; Obaidat, M.S.; Kumar, N.; Khan, M.K.; Choo, K.K.K.-K.R. Blockchain-Based Identity Management Systems: A Review; Elsevier Ltd.: Amsterdam, The Netherlands, 2020; Volume 166, p. 102731. [Google Scholar]
- Schaffner, M. Analysis and Evaluation of Blockchain-Based Self-Sovereign Identity Systems; Technical University of Munich: Munich, Germany, 2020. [Google Scholar]
- Alam, S. Identity Model for Blockchain-Based Land Registry System: A Comparison. Wirel. Commun. Mob. Comput. 2022, 2022, 1–17. [Google Scholar] [CrossRef]
- Wang, F.; de Filippi, P. Self-Sovereign Identity in a Globalized World: Credentials-Based Identity Systems as a Driver for Economic Inclusion. Front. Blockchain 2020, 2, 28. [Google Scholar] [CrossRef] [Green Version]
- Ellingsen, J. Self-Sovereign Identity Systems: Opportunities and Challenges. Master’s Thesis, Norwegian University of Science and Technology, Trondheim, Norway, 2019. [Google Scholar]
- Shuaib, M.; Alam, S.; Alam, M.S.; Nasir, M.S. Self-sovereign identity for healthcare using blockchain. Mater. Today Proc. 2021, 1–8. [Google Scholar] [CrossRef]
- Shuaib, M.; Alam, S.; Nasir, M.S.; Alam, M.S. Immunity credentials using self-sovereign identity for combating COVID-19 pandemic. Mater. Today Proc. 2021, 1–6. [Google Scholar] [CrossRef] [PubMed]
- van Bokkem, D.; Hageman, R.; Koning, G.; Nguyen, L.; Zarin, N. Self-Sovereign Identity Solutions: The Necessity of Blockchain Technology. arXiv 2019, arXiv:1904.12816. [Google Scholar]
- Naik, N.; Jenkins, P. Governing Principles of Self-Sovereign Identity Applied to Blockchain Enabled Privacy Preserving Identity Management Systems. In Proceedings of the 2020 IEEE International Symposium on Systems Engineering (ISSE), Vienna, Austria, 12 October–12 November 2020; pp. 1–6. [Google Scholar] [CrossRef]
- Naik, N.; Jenkins, P. Digital Identity Roadmap Guide; International Telecommunications Union: Geneva, Switzerland, 2019. [Google Scholar]
- The National Archives. Guidance on Digital Preservation; 2013. Available online: http://www.nationalarchives.gov.uk/information-management/projects-and-work/guidance.htm (accessed on 13 January 2021).
- Lyons, T.; Courcelas, L.; Timsit, K. Blockchain for Government and Public Services. In Proceedings of the Eupopean union Blockchain Observatory & Forum, Brooklyn, NY, USA, 7 December 2018. [Google Scholar]
- OIX. The Open Identity Exchange. 2019. Available online: https://openidentityexchange.org/members/anon/new.html?destination=%2Findex.html (accessed on 13 January 2021).
- e-Estonia. e-Identity. 2019. Available online: https://e-estonia.com/solutions/e-identity/id-card/ (accessed on 13 January 2021).
- López, M.A. Self-Sovereign Identity: The Future of Identity: Self-Sovereignity, Digital Wallets, and Blockchain; Inter-American Development Bank: Washington, DC, USA, 2020. [Google Scholar]
- Bamasaq, O.; Alghazzawi, D.; Bhatia, S.; Dadheech, P.; Arslan, F.; Sengan, S.; Hassan, S.H. Distance Matrix and Markov Chain Based Sensor Localization in WSN. Comput. Mater. Contin. 2022, 71, 4051–4068. [Google Scholar] [CrossRef]
- Sporny, M.; Longley, D.; Chadwick, D. Verifiable Credentials Data Model 1.0, 2019. Available online: https://www.w3.org/TR/vc-data-model/ (accessed on 2 February 2021).
- Kumar, A.; Bhatia, S.; Kaushik, K.; Gandhi, S.M.; Devi, S.G.; Pacheco, D.A.D.J.; Mashat, A. Survey of Promising Technologies for Quantum Drones and Networks. IEEE Access 2021, 9, 125868–125911. [Google Scholar] [CrossRef]
- Reed, D.; Sporny, M.; Longley, D.; Allen, C.; Grant, R.; Sabadello, M. Decentralized Identifiers (DIDs) v1.0 Properties id. www.w3c.org. 2021. Available online: https://w3c.github.io/did-core (accessed on 19 August 2021).
- W3C Credentials Community Group. Verifiable Claims Task Force. 4 May 2017. Available online: https://w3c.github.io/vctf/ (accessed on 2 August 2021).
- Christopher, A.; Arthur, B.; Vitalik, B.; Jon, C.; Duke, D.; Christian, L.; Kravchenko, P.; Nelson, J.; Reed, D.; Sabadello, M.; et al. Decentralized Public Key Infrastructure. White Paper, Rebooting the Web of Trust. 2015. Available online: https://www.weboftrust.info/downloads/dpki.pdf (accessed on 2 April 2022).
- Reed, D.; Sporny, M.; Longley, D.; Allen, C.; Grant, R.; Sabadello, M. Decentralized Identifiers (DIDs): Data Model and Syntaxes for Decentralized Identifiers. 2019. Available online: https://w3c-ccg.github.io/did-spec/ (accessed on 13 December 2021).
- Government of Canada. Pan-Canadian Trust Framework Overview. Github. Available online: https://canada-ca.github.io/PCTF-CCP/ (accessed on 25 February 2021).
- Palanisamy, T.; Alghazzawi, D.; Bhatia, S.; Malibari, A.A.; Dadheech, P.; Sengan, S. Improved Energy Based Multi-Sensor Object Detection in Wireless Sensor Networks. Intell. Autom. Soft Comput. 2022, 33, 227–244. [Google Scholar] [CrossRef]
- Hyperledger. MSP Implementation with Identity Mixer—Hyperledger-Fabricdocs Master Documentation. 2018. Available online: https://hyperledger-fabric.readthedocs.io/en/release-1.3/idemix.html#what-is-idemix (accessed on 23 March 2022).
- Sporny, M.; Longley, D.; Kellogg, G.; Lanthaler, M.; Lindström, N. JSON-LD 1.1. 16 July 2020. Available online: https://www.w3.org/TR/json-ld/ (accessed on 19 February 2022).
- Sabadello, M. A Universal Resolver for Self-Sovereign Identifiers. Medium. 1 November 2017. Available online: https://medium.com/decentralized-identity/a-universal-resolver-for-self-sovereign-identifiers-48e6b4a5cc3c (accessed on 19 January 2022).
- Tobin, A.; Reed, D. The Inevitable Rise of Self-Sovereign Identity; Sovrin Foundation: Provo, UT, USA, 2017; Available online: https://sovrin.org/wp-content/uploads/2017/06/The-Inevitable-Rise-of-Self-Sovereign-Identity.pdf (accessed on 17 December 2021).
- Sharaff, A.; Kamal, C.; Porwal, S.; Bhatia, S.; Kaur, K.; Hassan, M.M. Spam message detection using Danger theory and Krill herd optimization. Comput. Netw. 2021, 1389, 199–1286. [Google Scholar] [CrossRef]
- Glauser, R. Self-Sovereign Identities in Cardossier; ETH Zürich: Zurich, Switzerland, 11 June 2019; Available online: https://pub.tik.ee.ethz.ch/students/2018-HS/MA-2018-34.pdf (accessed on 20 January 2022).
- Clauß, S.; Köhntopp, M. Identity management and its support of multilateral security. Comput. Netw. 2001, 37, 205–219. [Google Scholar] [CrossRef]
- Shuaib, M.; Daud, S.M.; Alam, S.; Khan, W.Z. Blockchain-based framework for secure and reliable land registry system. Telkomnika 2020, 18, 2560–2571. [Google Scholar] [CrossRef]
- el Maliki, T.; Seigneur, J.-M. A Survey of User-centric Identity Management Technologies. In Proceedings of the International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007), Valencia, Spain, 14–20 October 2007; pp. 12–17. [Google Scholar] [CrossRef]
- Rajput, A.; Gopinath, K. Towards a more secure aadhaar. In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Springer: Cham, Switzerland, 2017; Volume 10717, pp. 283–300. [Google Scholar] [CrossRef]
- Lim, S.Y.; Fotsing, P.T.; Almasri, A.; Musa, O.; Kiah, M.L.M.; Ang, T.F.; Ismail, R. Blockchain technology the identity management and authentication service disruptor: A survey. Int. J. Adv. Sci. Eng. Inf. Technol. 2018, 8, 1735–1745. [Google Scholar] [CrossRef]
- Maler, E.; Reed, D. The Venn of Identity: Options and Issues in Federated Identity Management. IEEE Secur. Priv. Mag. 2008, 6, 16–23. [Google Scholar] [CrossRef]
- Singla, R.; Kaur, N.; Koundal, D.; Lashari, S.A.; Bhatia, S.; Rahmani, M.K.I. Optimized Energy Efficient Secure Routing Protocol for Wireless Body Area Network. IEEE Access 2021, 9, 116745–116759. [Google Scholar] [CrossRef]
- Avellaneda, O.; Bachmann, A.; Barbir, A.; Brenan, J.; Dingle, P.; Duffy, K.H.; Maler, E.; Reed, D.; Sporny, M. Decentralized Identity: Where Did It Come From and Where Is It Going? IEEE Commun. Stand. Mag. 2019, 3, 10–13. [Google Scholar] [CrossRef]
- Soltani, R.; Nguyen, U.T.; An, A. A New Approach to Client Onboarding Using Self-Sovereign Identity and Distributed Ledger. In Proceedings of the 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Halifax, NS, Canada, 30 July–3 August 2018; pp. 1129–1136. [Google Scholar] [CrossRef]
- Davie, M.; Gisolfi, D.; Hardman, D.; Jordan, J.; O’Donnell, D.; Reed, D. The Trust over IP Stack. IEEE Commun. Stand. Mag. 2019, 3, 46–51. [Google Scholar] [CrossRef]
- Hardman, D. No Paradox Here: ZKPs Deliver Savvy Trust-Evernym. 2020. Available online: https://www.evernym.com/blog/no-paradox-here-zkps-deliver-savvy-trust/ (accessed on 29 January 2022).
- Sedlmeir, J.; Smethurst, R.; Rieger, A.; Fridgen, G. Digital Identities and Verifiable Credentials. Bus. Inf. Syst. Eng. 2021, 63, 603–613. [Google Scholar] [CrossRef]
- ketterer, J.A.; andrade, G. Blockchain Asset Registries: Approaching Enlightenment?—CoinDesk. 2 December 2017. Available online: https://www.coindesk.com/blockchain-asset-registries-entering-slope-enlightenment (accessed on 14 November 2021).
- International Finance Corporation. Secured Transactions Systems and Collateral Registries; World Bank: Washington, DC, USA, 7 February 2017. [Google Scholar] [CrossRef]
- Hendow, M. Bridging Refugee Protection and Development. 7 January 2019. Available online: https://www.researchgate.net/publication/331530630_Bridging_refugee_protection_and_development_Policy_Recommendations_for_Applying_a_Development-Displacement_Nexus_Approach (accessed on 2 April 2022).
- Dempsey, J.; Graglia, M. Case Study: Property Rights and Stability in Afghanistan. New America, 5 May 2017; p. 4. [Google Scholar]
SSI Principle | SSI Solutions | |||
---|---|---|---|---|
uPort | ShoCard | Sovrin | Civic | |
Control | Y | Y | Y | Y |
Access | Y | X | Y | X |
Transparency | Y | Y | Y | Y |
Persistence | X | X | X | X |
Portability | Y | Y | Y | X |
Interoperability | Y | Y | Y | Y |
Consent | Y | Y | Y | Y |
Minimalization | Y | Y | Y | Y |
Protection | Y | X | X | X |
Existence | X | Y | Y | X |
Source for Rules Regulating Liability | General Law | Identity-Specific Law | Contract-Based Rules |
---|---|---|---|
Level | 1 | 2 | 3 |
Type of rule | Public Law | Public Law | Private Law |
Usefulness | Everyone within the jurisdiction | Persons in ID system jurisdiction covered by the statute | Entities that adhere to the terms of the contract |
S.No | Requirements | Description |
---|---|---|
1 | Creating a trustworthy registry | The government shall establish and manage the public register. If people want to use a blockchain network, they need to define who can join the network and who can not. |
2 | Build new digital wallets | Certain government organizations have been granted the authority to trusted digital wallets providers. |
3 | Attractions of individuals | The government would allow its citizens to register their digital IDs for government-based services to promote e-government services. |
4 | Development of DIDs | The government would require one DID method and allow wallet providers to use it. |
5 | Identification of standards | Recognition of decentralized identifiers and verifiable credentials must be adopted by world leaders such as ISO, ITU, IEEE or NIST. |
6 | Issuing of verifiable credentials/certifications | The government will develop relevant systems and protocols for issuing digital ID documents (e.g., a digital passport). |
7 | Acceptance by service providers | The authentication of SSI-compliant digital identities is more convenient for service providers because they can verify customers more easily, more effectively and with higher security levels. |
SSI Principle | Description | SSI Components |
---|---|---|
Control | The user controls and has authority over identity and personal data. Files are kept in a decentralized manner to the fullest extent. | Asymmetric cryptography authentication protocol DPKI (DID holder) |
Access | User can access their data and identities quickly and directly. | DID naming system Digital credential wallet |
Transparency | The operation and system used need to be transparent. Additionally, how an identity scheme operates, is managed and maintained should be publicly available and easily understood. | Open protocols and open standards |
Persistence | The identity will last long since user identities will exist from birth to death. | Time revocation Revocation list Proof of non- revocation DKMS key recovery |
Portability | The services of the identity system must be transportable. The user identification is not limited to any network. Additionally, users should be able to move their names, certificates and proofs from one network to another. | Open standard DID |
Interoperability | Identities should be as universally accepted. The organizations, databases or registries can interact internationally easily and securely via an identity system. | JSON-LD universal resolver DID Auth protocol |
Consent | Users can explicitly authorize other entities to use their identity data. | Verifiable credential asymmetric cryptography authentication protocol |
Existence | Users must have an independent existence | DID documents verifiable presentation Multiple identifiers Anonymous credentials |
Minimalization | Prevents detailed disclosure of identity information as minimizing the disclosure of identity information will enhance privacy. | ZK capable verifiable credentials |
Protection | The rights of user privacy need to be protected. The identity solution must include the “privacy by design” principle. | pairwise-pseudonymous DIDs Verifiable presentations DKMS endpoints |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Shuaib, M.; Hassan, N.H.; Usman, S.; Alam, S.; Bhatia, S.; Agarwal, P.; Idrees, S.M. Land Registry Framework Based on Self-Sovereign Identity (SSI) for Environmental Sustainability. Sustainability 2022, 14, 5400. https://doi.org/10.3390/su14095400
Shuaib M, Hassan NH, Usman S, Alam S, Bhatia S, Agarwal P, Idrees SM. Land Registry Framework Based on Self-Sovereign Identity (SSI) for Environmental Sustainability. Sustainability. 2022; 14(9):5400. https://doi.org/10.3390/su14095400
Chicago/Turabian StyleShuaib, Mohammed, Noor Hafizah Hassan, Sahnius Usman, Shadab Alam, Surbhi Bhatia, Parul Agarwal, and Sheikh Mohammad Idrees. 2022. "Land Registry Framework Based on Self-Sovereign Identity (SSI) for Environmental Sustainability" Sustainability 14, no. 9: 5400. https://doi.org/10.3390/su14095400
APA StyleShuaib, M., Hassan, N. H., Usman, S., Alam, S., Bhatia, S., Agarwal, P., & Idrees, S. M. (2022). Land Registry Framework Based on Self-Sovereign Identity (SSI) for Environmental Sustainability. Sustainability, 14(9), 5400. https://doi.org/10.3390/su14095400