<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Centralized Versus Decentralized Digital Identity Architectures: Simulation Models of Data Exchange</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Yoshiaki</forename><surname>Fukami</surname></persName>
							<email>yofukami@sfc.keio.ac.jp</email>
						</author>
						<author>
							<persName><forename type="first">Takumi</forename><surname>Shimizu</surname></persName>
							<email>takumis@sfc.keio.ac.jp</email>
							<affiliation key="aff1">
								<orgName type="institution">The University of Tokyo</orgName>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Teruaki</forename><surname>Hayashi</surname></persName>
							<email>hayashi@sys.t.u-tokyo.ac.jp</email>
						</author>
						<author>
							<persName><forename type="first">Hiroki</forename><surname>Sakaji</surname></persName>
							<email>sakaji@sys.t.u-tokyo.ac.jp</email>
							<affiliation key="aff2">
								<orgName type="institution">Shiga University</orgName>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Hiroyasu</forename><surname>Matsushima</surname></persName>
							<email>hiroyasu-matsushima@biwako.shiga-u.ac.jp</email>
						</author>
						<author>
							<affiliation key="aff0">
								<orgName type="institution">Keio University</orgName>
							</affiliation>
						</author>
						<title level="a" type="main">Centralized Versus Decentralized Digital Identity Architectures: Simulation Models of Data Exchange</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">CD369C3E810822DCE8DC1DC1F8CDD042</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-23T20:23+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>In order to utilize big data generated from distributed cloudbased services, a digital ID is required to link between data and its subjects. Decentralized Identifiers (DID) have been developed to manage data from various services with privacy protection. We analyzed two ID architectures, DID and centralized ID (CID), with simulation models to evaluate the efficiency of ID architectures. In a monopoly market where there is no competition between ID providers, there is no difference between DID and CID. However, if there are multiple ID providers without interoperability, service providers have access to more data in the DID architecture compared to CID. However, this result was affected by the design of the model without ID federation technologies. Currently, service providers can receive data from many third-party services with the ID federation standard. Also, the simulation results that DID is very efficient for data distribution should be carefully interpreted by considering the upcoming costs for implementation.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Background</head><p>In recent years, consumers have come to have a large number of user accounts linked to more and more cloudbased services. This has led to the accumulation of a wide variety of attribute data in the cloud, increasing the potential for the creation of new services, while at the same time developing a means of sharing data that is fragmented between services in a way that is easy to use and protects the rights of consumers. Service providers can identify consumers with digital IDs provided by third party companies and obtain attribute data stored by other services under consumer authentication.</p><p>Most of the data accumulated from multiple services is linked to the ID issued by a specific small number of companies, and such companies also provide functions of authorization. This means that there is some risk that distributed data could be accumulated, analyzed and utilized for unintended use under malicious intent. The risk of privacy infringement is increased by aggregating various attribute data. While the ID federation enhances consumer convenience, it also increases the risk of privacy breaches.</p><p>DID is an architecture in which the entity that provides attribute information issues digital IDs in a distributed manner enabled by blockchain technologies. In contrast to DID, an architecture that uses existing ID federation technology is called a Centralized Identifier (CID). With DID, aggregated data can be utilized only with consumer's authentication, and without linking to specific ID providers such as Google and Facebook.</p><p>From the service provider's point of view, it is advantageous to be able to obtain and utilize diverse data at low cost, and it will encourage the emergence of innovations in the form of new services. Both architectures, CID and DID, have their advantages and disadvantages, and it is difficult to determine which is better simply. Therefore, we use a simulation approach in order to study many factors in an integrated manner.</p><p>In multi-agent simulation, people and objects can be represented as agents, and phenomena resulting from their interactions can be observed. For example, it is applied to fields such as traffic <ref type="bibr">(Bazzan &amp; Klügl, 2009)</ref>, pedestrian flow <ref type="bibr" target="#b3">(Yamashita et al., 2014)</ref>, and market transactions <ref type="bibr" target="#b1">(Hirano et al., 2020;</ref><ref type="bibr" target="#b2">Yagi et al., 2020)</ref>. By confirming the simulation results, it is possible to support decision-making in planning and policy making related to them.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Models</head><p>This study employs simulation models to analyze the CID and DID structures and their impacts on data exchange. In the CID model, each user has some data which is managed by ID providers. Service providers have their needs (i.e., which data a service provider needs to create products) and try to obtain the data they need by accessing the IDs users have. Verifiers may or may not get the data depending on an ID that bridges transactions between users and verifiers. For instance, if a verifier asks a user to share the data "a" and the user uses the ID "A" for this transaction, the verifier can get the data "a". If the user uses the ID "B" in this case, the verifier cannot get the data. In the DID model, there is no ID provider in the transaction. A verifier directly contacts a user and requests the data it needs. Each user decides whether he/she accepts the request from a verifier. These models aim to uncover the efficient data exchange structure considering various parameters such as the number of users and CID providers and the cost of transactions. Figure <ref type="figure" target="#fig_1">1</ref>   </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Results</head><p>We evaluate the models based on the number of data that a service provider can access depending on the ID structures. In the CID models, the key parameter is the number of CID providers. If there is one CID provider, a service provider can access all the user data via this particular CID provider. Our simulation assumes 10,000 users in the model, so a service provider can access 10,000 user data in this case. As the number of CID providers increases, user data is dispersed across CID providers and a service provider can obtain only subsets of user data via a CID provider. In the DID models, the key parameter is the attrition rate of service provider's data request. Since the DID requires users to manage each transaction per data record by themselves unlike the CID which allows CID providers to manage it, a service provider sometimes cannot obtain the data due to this burden of user's data management. Figure <ref type="figure" target="#fig_2">2</ref> shows the results of our simulation models considering various levels of key parameters. As the graph indicates, the number of data that a service provider can access dramatically decreases as the number of CID providers increases. On the other hand, the number of accessible data in the context of DID stays relatively large even in the case of high attrition rate. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Discussion</head><p>The result is that service providers have access to more data in the DID architecture compared to CID. However, this result was affected by the design of the model that only introduced the authentication / authorization function of independent third parties without ID federation technologies. Currently, service providers are able to receive data from many third-party services with the ID federation standard such as OpenID connect.</p><p>On the other hand, the simulation results show that DID is very positive for data distribution. However, DID has not been diffused yet, and it costs for both data providers and acquirers to implement DID technology. The benefits of DID architecture may be offset or negated by the costs of dissemination, which are not reflected in this model.</p><p>Future research needs more fine-grained models which reflect real-world ID operations and practices being developed at standard developing organizations and issues mentioned above such as ID federation and cost structures of ID architectures. This study opens up new research avenues for digital identity structure and data exchange by showing a basic understanding and implications of CID versus DID architectures.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head></head><label></label><figDesc>describes the model structures. ___________________________________ In T. Kido, K. Takadama (Eds.), Proceedings of the AAAI 2022 Spring Symposium "How Fair is Fair? Achieving Wellbeing AI", Stanford University, Palo Alto, California, USA, March 21-23, 2022. Copyright © 2022 for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0).</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: The overview of the models</figDesc><graphic coords="2,54.00,54.00,238.50,134.00" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Figure 2 :</head><label>2</label><figDesc>Figure 2: The number of accessible data in CID/DID</figDesc><graphic coords="2,54.00,524.12,238.50,110.00" type="bitmap" /></figure>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Acknowledgments</head><p>This work was supported by JSPS KAKENHI 19K23235, 20H02384, and 20K13599.</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<monogr>
		<title level="m" type="main">Multi-Agent Systems for Traffic and Transportation Engineering</title>
		<idno type="DOI">.org/10.4018/978-1-60566-226-8</idno>
		<editor>Bazzan, A.</editor>
		<editor>and Klügl, F.</editor>
		<imprint>
			<date type="published" when="2009">2009</date>
			<publisher>IGI Global</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Comparing Actual and Simulated HFT Traders&apos; Behavior for Agent Design</title>
		<author>
			<persName><forename type="first">M</forename><surname>Hirano</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Izumi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Matsushima</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Sakaji</surname></persName>
		</author>
		<idno type="DOI">.org/10.18564/jasss.4304</idno>
	</analytic>
	<monogr>
		<title level="j">Journal of Artificial Societies and Social Simulation</title>
		<imprint>
			<biblScope unit="volume">23</biblScope>
			<biblScope unit="issue">3</biblScope>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Analysis of the Impact of High-Frequency Trading on Artificial Market Liquidity</title>
		<author>
			<persName><forename type="first">I</forename><surname>Yagi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Masuda</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Mizuta</surname></persName>
		</author>
		<idno type="DOI">.org/10.1109/TCSS.2020.3019352</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Computational Social Systems</title>
		<imprint>
			<biblScope unit="volume">7</biblScope>
			<biblScope unit="issue">6</biblScope>
			<biblScope unit="page" from="1324" to="1334" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Exhaustive analysis with a pedestrian simulation environment for assistant of evacuation planning</title>
		<author>
			<persName><forename type="first">T</forename><surname>Yamashita</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Matsushima</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Noda</surname></persName>
		</author>
		<idno type="DOI">.org/10.1016/j.trpro.2014.09.047</idno>
	</analytic>
	<monogr>
		<title level="j">Transportation Research Procedia</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="page" from="264" to="272" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
