The danger is organisations try to define identity by collecting attributes that ‘proof’ the identity.
The next thing is sharing data over this "Know Your Customer” data. Blockchain or not!
This is why a clean separation is needed between
core identity (as a representation of the individual online) versus personal ‘attributes’, which is data
about the individual/persona.
As such, an identity provider is only to define and/or
proof the core identity. Period. (yes we have national ID cards in Europe)
In Thomas picture, the notion of persona in fact then holds two different elements:
- a pairwise persistent pseudonym per service provider (read: no correlation) of a
fully pairwise persistent pseudonym per web service (see: privacy-preservation in deep WS call chains)
- a persona which (can) represent a selection (think a directed graph) of contextualized personal data to be shared, possibly valid over a number of organisations within that context.
The consistent use of pairwise persistent pseudonyms solves
a lot of problems by rethinking identity
in a symmetrical way.
- Identity disclosure now becomes the sole prerogative of the individual
- Analytics on pairwise pseudonymous identified data now becomes much more acceptable.
We have all the above done using using a SAML-ID-WSF2 and OpenID-UMA framework. It is complex.
Time for blockchain-isch tech to make things simpler (where possible!)
Secondly, we should distance ourselves of where personal data is hosted: on premise, with the individual, in the ecosystem cloud or with a PDS vendor.
The same authorisation methods should always be used.
Again, I plea to follow Thomas use case, with the separation of pseudo-identifiers and persona's
Luk.
John,
With respect to your comment, "I think you have correctly identified a normative inverse relationship between "Core Identity" attributes what should be written openly to a blockchain":
I share your belief in the separation of a Core Identity from attributes included in various personas that may be unveiled to particular RPs. But it is not clear to me where one can draw the line. The
Core Identity needs to have enough data to authenticate the user and his/her various personas, so that the RP can then authorize activity based on the attributes provided in the persona. But what data and how much of it do we need to unmistakably authenticate
the user? The more attributes we include in the Core Identity, the more vulnerable the user becomes to having that data used against them by an adversary who can break into the Core Identity repository.
Jeff
_______________________________________________
DG-BSC mailing list
DG-BSC@kantarainitiative.org
http://kantarainitiative.org/mailman/listinfo/dg-bsc