IJCSIT

Blockchain-Based Privacy Preservation in Digital Identity Systems

© 2025 by IJCSIT

Volume 1 Issue 2

Year of Publication : 2025

Author : Shalini Kumaravel, Afrina Bhanu

: XXXXXXXX

Citation :

Shalini Kumaravel, Afrina Bhanu, 2025. "Blockchain-Based Privacy Preservation in Digital Identity Systems" International Journal of Computer Science & Information Technology  Volume 1, Issue 2: 34-42.

Abstract :

As we witness digital identity systems making its entry into the government and private sector realm, protecting personal privacy and providing secure data becomes a necessary evil. Centralised Identity: They produce hazards being breaches, tracking and identity theft. In summary, blockchain provides a decentralized way with a higher degree of transparency and auditability but must be supplemented by privacy-preservation techniques to meet current and future data protection needs. More specially, although BoL is the abstract interface of BoD and it dependents on the lower-level storage. (A) Whenb is allowed to look at an arbitrary MapType. In this article we compile the blockchain digital identity frame works and discuss ways to maintain privacy. This report offers a comparison between models used in the industry, and introduces new best practices (DIDs / VCs) as well as cryptographic tools such as ZKPs, ring signatures, homomorphic encryption etc. In this paper, we present a hybrid model combining on-chain verification with off-chain document storing to resolve the trade-off between scalability, privacy and interoperability. The ultimate portion of the paper concludes with a reflection on existing deployments, legal requirements and the future roadmap of private blockchain identity systems.

References :

[1] W3C. "Decentralized Identifiers (DIDs)." 2023.

[2] W3C. "Verifiable Credentials Data Model." 2023.

[3] Zyskind, G., Nathan, O., & Pentland, A. (2015). Decentralizing Privacy — Securing Personal Data with Blockchain. IEEE SPW.

[4] Sovrin Foundation. "Sovrin Protocol and Governance Framework."

[5] Al-Bassam, M. (2018). What is SCPKI: The Smart Contract-based PKI & Identity System.

[6] Liu, Y., & Wang, J. (2019). Blockchain-based Decentralized Identity Management Model. Future Internet, 9(4), 88.

[7] European Union. "General Data Protection Regulation (GDPR)."

[8] Bonneau, J. et al. (2015). A Next Step in Mainstreaming Bitcoin and the Blockchain. S&P 2018.

[9] Buterin, V. (2013). "Ethereum Whitepaper."

[10] Hyperledger Indy. https://www.hyperledger.org/use/hyperledger-indy

[11] Civic Identity Platform. https://www.civic.com

[12] Microsoft ION. https://github.com/decentralized-identity/ion

[13] Chaum, D. (1981). Anonymous email, or How to Write Without Being Seen.

[14] Ben-Sasson, E., et al. (2014). Smart Contracts with ZK-SNARKs — Succinct Non-Interactive Zero Knowledge.

[15] Shamir, A. (1985). Identity-Based Cryptosystems and Signature Schemes.

[16] Rivest, R., Shamir, A., & Adleman, L. (1978). Digital Signatures and Public Key Certification.

[17] IPFS. https://ipfs.io

[18] ISO/IEC 27560. "Decentralized Identity Management."

[19] Liang, X., et al. (2017). Disseminated Liability and Self-Sovereignty in Healthcare Systems. IEEE Access.

[20] Narayanan, A., et al. (2016). Bitcoin and Cryptocurrency Technologies.

[21] Allen, C. (2016). The Path to Self-Sovereign Identity.

[22] Fristedt, Barbi, & Chaum, D. (2001). Mixed Nets: A Network Architecture for Anonymity. Privacy Enhancing Technologies Workshop.

[23] Camenisch, J., & Lysyanskaya, A. Efficient Anonymous Credentials Without Non-Transferability.

[24] EU Blockchain Observatory. (2021). "Blockchain and Identity."

[25] Tang, C., et al. (2020). Proof of Existence/Proof of Identity: A Way Towards a Blockchain-Based Privacy-Preserving Digital Identity. ACM DLT.

[26] IBM. (2020). "Blockchain for Identity Management."

[27] Christidis, K., & Devetsikiotis, M. (2016). Blockchains and Smart Contracts. IEEE Communications.

[28] Koblitz, N., & Menezes, A. (2015). A Survey of Public-Key Cryptosystems.

[29] Nakamoto, S. (2008). Bitcoin: A Peer-to-Peer Electronic Cash System.

[30] Fernandes, M., et al. (2019). Ring Signatures in Identity Systems.

[31] Dwork, C., & Naor, M. (1993). Pricing via Processing or Combatting Junk Mail.

[32] Hardman, J. (2022). Blockchain and Identity: Opportunities and Challenges. Journal of Internet Law, 25(8), 1–10.

[33] Sovrin Foundation. (2021). Sovrin: Self-Sovereign Identity on the Blockchain.

[34] Preukschat, A., & Reed, D. (2020). Self-Sovereign Identity: Decentralized Digital Identity and Verifiable Credentials. Manning.

[35] Allen, C., et al. (2021). Decentralized Identifiers and the Role of DID Documents. Internet Identity Workshop.

[36] W3C Credentials Community Group. (2019). Use Cases for Verifiable Credentials.

[37] O'Hara, K., & Hall, W. (2020). Four Internets: Data, Geopolitics, and the Governance of Cyberspace.

[38] Mühle, A., Grüner, A., Gayvoronskaya, T., & Meinel, C. (2018). A Survey on Essential Components of a Self-Sovereign Identity. Computer Science Review, 30, 9–29.

[39] Naik, N., & Jenkins, P. (2020). A Comparison of Blockchain Identity Management Systems. Journal of Network and Computer Applications, 163, 102656.

[40] Jain, V., et al. (2022). A Scalable Identity System Using Blockchain for Smart Cities. IEEE Access, 10, 2987–3002.

[41] Wüst, K., & Gervais, A. (2018). Do You Need a Blockchain? Crypto Valley Conference on Blockchain Technology.

[42] Dunphy, P., & Petitcolas, F. A. P. (2018). A First Look at Identity Management Schemes on the Blockchain. IEEE Security & Privacy, 16(4), 20–29.

[43] Halpin, H., & Piekarska, M. (2018). Self-Sovereign Identity and Blockchain. IEEE Security & Privacy, 16(4), 38–45.

[44] Tobin, A., & Reed, D. (2016). The Inevitable Rise of Self-Sovereign Identity. Sovrin Foundation Whitepaper.

[45] Grech, A., & Camilleri, A. F. (2017). Blockchain in Education. European Commission Joint Research Centre.

[46] Huh, S., Cho, S., & Kim, S. (2017). Managing IoT Devices Using Blockchain Platform. International Conference on Advanced Communication Technology.

[47] Binns, R. (2018). Data Protection Impact Assessments: A Meta-Regulatory Approach. International Data Privacy Law, 8(1), 29–49.

[48] Belchior, R., et al. (2021). A Survey on Blockchain Interoperability. ACM Computing Surveys (CSUR), 54(8), 1–41.

[49] Azbeg, K., & Bernabe, J. B. (2022). Privacy-Preserving Decentralized Identity for Edge Environments. IEEE Internet of Things Journal, 9(5), 3821–3833.

[50] Delerablée, C., et al. (2019). A Privacy-Preserving Identity Management System Using Blockchain. Proceedings of the 14th ACM ASIACCS.

Keywords :

Blockchain, Self Sovereign Identity, Privacy Preserving, Zero-Knowledge Proofs, Dids And Vcs, GDPR.