DIDs and Verifiable Credentials
Last updated
Last updated
Ecosphere tracks data provenance by using a combination of blockchain technology and decentralized identifiers (DIDs). This is similar to the design used in the Hedera Guardian. Here’s how it works:
Decentralized Identifiers (DIDs): Ecosphere uses DIDs to uniquely identify data sources and their owners. These identifiers are crucial for establishing trust and authenticity without relying on centralized authorities.
Verifiable Credentials: Data is often accompanied by verifiable credentials, which are cryptographically secure and can prove the authenticity and integrity of the data. These credentials are issued by Ecosphere during the user and device registration process.
Immutable Ledger: Hedera's distributed ledger technology ensures that once data is recorded, it cannot be altered or tampered with. This immutability is essential for maintaining a reliable history of data provenance.
Smart Nodes: Smart nodes are used to automate the tracking and verification of data provenance. These contracts can enforce rules and conditions for data use and access, ensuring compliance and transparency.
Audit Trails: Every transaction or change in data is logged with a timestamp and other relevant metadata, creating a complete audit trail. This trail can be reviewed to verify the origin and journey of the data.
Interoperability: Ecosphere plans to integrate with other systems and technologies in the future. This will require the establishment of a set of standards to ensure that data provenance information can be shared and usable across different platforms and sectors.
By combining these elements, the Ecosphere provides a robust framework for tracking data provenance, ensuring that data is trustworthy and its origins can be verified.
Identify Data Source:
Determine the data source that needs a unique decentralized identifier (DID).
Generate DID:
Use a DID method to generate a unique DID for the data source. This involves creating a DID document that includes public keys and service endpoints.
Register DID:
Register the DID on a decentralized network, ensuring it is publicly resolvable. This makes the DID discoverable and verifiable by others.
Prepare Credential Data:
Collect the necessary data that will be included in the verifiable credential. This data typically includes claims about the data source.
Sign Credential:
The issuer (Ecosphere) digitally signs the credential using their private key. This signature ensures the credential's integrity and authenticity.
Embed Proofs:
Embed cryptographic proofs in the VC to enable verifiers to check its validity and integrity.
Issue Credential:
Issue the signed verifiable credential to the holder, which in this case is the entity responsible for the data transfer.
Present Credential:
When transferring data, the holder presents the verifiable credential to the recipient or verifier.
Verify Credential:
The verifier checks the cryptographic signature and proofs to ensure the credential is authentic and has not been tampered with.