Decentralized Authentication Identities to Improve Security

23/02/2023

Decentralized Authentication Identities to           Improve Security

The innovation team at the Atlantic Institute, Brazil, had been working for some time on an idea which they wished to make a reality: the creation of decentralized authentication identities using blockchain technology to improve Internet security and privacy. The model was primarily aimed at managing the identities of Internet of Things (IoT) devices, as a way to ensure a more secure access control and prevent spoofing attacks.

Janus —the name given to this initiative— remained an aspiration until its promoters submitted the project to the annual call for proposals published by FRIDA, a LACNIC program that supports projects, initiatives, and solutions that seek to strengthen the Internet in the region.

According to Alex Monteiro, the institute’s R&D and Innovation coordinator, “FRIDA became the perfect way to transform this experiment into a larger project.”

The Atlantic Institute has the mission to provide technological solutions for social development, and FRIDA provides non-reimbursable funding, follow up, and technical support to projects that seek to build an open, stable, and secure global Internet. “We combined both interests and obtained the funds needed to move from the research phase to the project development phase and an analysis of the feasibility of the technology,” Monteiro added.

What is Janus and what does it mean to manage decentralized blockchain identities?

Janus seeks to implement access control and management solutions for the Internet of Things (IoT) using decentralized identities, which contribute to the implementation of Zero Trust security architectures. Decentralized identities are cryptographically signed digital identities issued by a blockchain. The term ‘decentralization’ refers to the nature of the blockchain, where a network of computers with consensus mechanisms and cryptographic technology allows issuing and validating an identity without a centralized intermediary (access and identity management systems, etc.). This makes it possible to have a self-sufficient identity, with which a user can issue their own identity guaranteed by a computational structure that validates its issuance and verification. This increases the confidentiality of the data, the information on the devices, and user privacy, as it is no longer necessary to expose any information in order to validate an identity, a credential or data.

Can you give us an example of how Janus would improve the lives of users?

(Free access, no subscription required)

Imagine that an IoT device administrator wants to implement identity and access control for their devices, even for the users who may utilize services related to an IoT solution. With the traditional approach, this administrator must rely on a third-party identity issuer, trust this issuer, and share with them information such as credentials, device make and model, IP address, and others. Much of this data ends up traveling over the network, so even if end-to-end encryption is used, there is always a risk of data leaks that might eventually be used to launch a spoofing attack. With Janus, the data is encapsulated in the blockchain structure, which means that only the decentralized identifier travels over the network. This allows validating access, authentications, and confirming data without the need to expose the information, thus increasing confidentiality and privacy.

How does Janus pave the way for new models of trust between organizations and individuals?

Janus allows anyone to manage the identities of their devices without having to depend on a third party, with the reliability and security offered by blockchain. Once this mechanism is in place, it establishes trust and people are free to manage their identities and use a legitimate identity for themselves and for anything else. This breaks identity management paradigms, as organizations and individuals no longer need to rely on a third party to generate trust. Organizations can create secure access control mechanisms without having to transfer this data from one place to another.

Subscribe
Notify of

0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments