Hostname: page-component-6766d58669-mzsfj Total loading time: 0 Render date: 2026-05-20T08:08:45.445Z Has data issue: false hasContentIssue false

A comparative cyber risk analysis between federated and self-sovereign identity management systems

Published online by Cambridge University Press:  12 December 2023

Anhtuan Le*
Affiliation:
Warwick Manufacturing Group, University of Warwick, Coventry, UK
Gregory Epiphaniou
Affiliation:
Warwick Manufacturing Group, University of Warwick, Coventry, UK
Carsten Maple
Affiliation:
Warwick Manufacturing Group, University of Warwick, Coventry, UK
*
Corresponding author: Anhtuan Le; Email: a.le.1@warwick.ac.uk

Abstract

Self-sovereign identity (SSI) is an emerging and promising concept that enables users to control their identity while enhancing security and privacy compared to other identity management (IDM) approaches. Despite the recent advancements in SSI technologies, federated identity management (FIDM) systems continue to dominate the IDM market. Selecting an IDM to implement for a specific application is a complex task that requires a thorough understanding of the potential external cyber risks. However, existing research scarcely compares SSI and FIDM from the perspective of these external threats. In response to this gap, our article provides an attack surface analysis focused solely on external threats for both systems. This analysis can serve as a reference to compare the relevant security and privacy risks associated with these external threats. The threat landscapes of external attackers were systematically synthesized from the main components and functionalities of the common standards and designs. We further present a use case analysis that applies this attack surface analysis to compare the external cyber risks of the two systems in detail when managing cross-border identity between European countries. This work can be particularly useful for considering a more secure design for future IDM applications, taking into account the landscape of external threats.

Information

Type
Research Article
Creative Commons
Creative Common License - CCCreative Common License - BY
This is an Open Access article, distributed under the terms of the Creative Commons Attribution licence (http://creativecommons.org/licenses/by/4.0), which permits unrestricted re-use, distribution and reproduction, provided the original article is properly cited.
Copyright
© The Author(s), 2023. Published by Cambridge University Press
Figure 0

Figure 1. A general architecture for FIDM (based on Cabarcos, 2013).

Figure 1

Table 1. A summary of attacksa toward FIDM components, attacks will be marked if included

Figure 2

Figure 2. A general architecture for SSI (based on Preukschat and Drummond, 2021).

Figure 3

Table 2. A summary of attacksa toward FIDM components, attacks will be marked if included

Figure 4

Figure 3. High-level architecture of eIDAS (based on Carretero et al., 2018).

Figure 5

Figure 4. Self-sovereign IDM using blockchain (based on Bernabe et al., 2019).

Figure 6

Table 3. A comparison of cyber risks between the two IDM systems - The red, orange, yellow colour indicates high, medium, and low risk respectively.

Submit a response

Comments

No Comments have been published for this article.