Publication:
Pseudonymity for Personal Data Stores: Pseudonymous WebIDs and Decentralized Identifiers
| cris.virtual.department | #PLACEHOLDER_PARENT_METADATA_VALUE# | |
| cris.virtual.department | #PLACEHOLDER_PARENT_METADATA_VALUE# | |
| cris.virtual.orcid | 0000-0001-7445-1881 | |
| cris.virtual.orcid | 0000-0003-0248-0987 | |
| cris.virtualsource.department | cb5e873e-e9c6-4e54-b031-fe215dc067a0 | |
| cris.virtualsource.department | 54a7efb9-d406-4578-a72e-be6a136a978a | |
| cris.virtualsource.orcid | cb5e873e-e9c6-4e54-b031-fe215dc067a0 | |
| cris.virtualsource.orcid | 54a7efb9-d406-4578-a72e-be6a136a978a | |
| dc.contributor.author | De Mulder, Gertjan | |
| dc.contributor.author | Ben De Meester | |
| dc.date.accessioned | 2026-04-14T07:07:56Z | |
| dc.date.available | 2026-04-14T07:07:56Z | |
| dc.date.createdwos | 2025-11-25 | |
| dc.date.issued | 2025 | |
| dc.description.abstract | Personal Data Stores like Fedora and Solid let users become data holders, controlling their personal data and Web interactions through interoperable standards. Pseudonyms protect privacy during data sharing while still allowing holders to later prove their true identity, making them key privacy-enhancing tools. However, pseudonyms are rarely tackled in existing decentralized personal data sharing standards. In this paper, we present, analyze, and evaluate pseudonymity methods within Solid – a maturing set of personal data sharing standards – applied to a job application use case. This use case consists of three flows: a pseudonym generation flow, a diploma verification flow using that pseudonym and data minimization using the Verifiable Credential standard, and a Proof of Ownership identity binding between the pseudonym and the user’s true identity. We compare two pseudonym generation solutions: a Solid-native solution that depends on an external party to lease (Web-resolvable) pseudonyms, and a solution that leverages a static resolving method (DID:Key) to generate ephemeral pseudonyms. The data flow diagrams, and STRIDE and LINDDUN analysis indicate that static identifiers are better for pseudonymous use cases, as they avoid reliance on external parties. The requirement validation show both solutions meet most needs, though the WebID solution remains observable and the DID:Key solution lacks support for deleting or managing pseudonyms. With this pseudonymity work, we aim to provide a next step to combine personal data storage incentives with Wallet incentives (such as those put forward by the EUDI). | |
| dc.description.wosFundingText | The described research activities were supported by SolidLab Vlaanderen (Flemish Government, EWI and RRF project VV023/10). imec ICON project SHARCS (Agentschap Innoveren en Ondernemen project nr. HBC.2022.0543), and Interreg project SecuWeb (0100085). The authors thank Vincent Naessens, Ruben Verborgh, and Pieter Colpaert for their valuable feedback. | |
| dc.identifier.doi | 10.1007/978-3-032-00639-4_7 | |
| dc.identifier.isbn | 978-3-032-00638-7 | |
| dc.identifier.issn | 0302-9743 | |
| dc.identifier.uri | https://imec-publications.be/handle/20.500.12860/59074 | |
| dc.language.iso | eng | |
| dc.provenance.editstepuser | greet.vanhoof@imec.be | |
| dc.publisher | SPRINGER INTERNATIONAL PUBLISHING AG | |
| dc.source.beginpage | 111 | |
| dc.source.conference | AVAILABILITY, RELIABILITY AND SECURITY, ARES 2025 | |
| dc.source.conferencedate | 2025-08-11 | |
| dc.source.conferencelocation | Ghent, Belgium | |
| dc.source.endpage | 129 | |
| dc.source.journal | AVAILABILITY, RELIABILITY AND SECURITY, ARES 2025, PT IV | |
| dc.source.numberofpages | 19 | |
| dc.title | Pseudonymity for Personal Data Stores: Pseudonymous WebIDs and Decentralized Identifiers | |
| dc.type | Proceedings paper | |
| dspace.entity.type | Publication | |
| imec.internal.crawledAt | 2026-04-07 | |
| imec.internal.source | crawler | |
| imec.internal.wosCreatedAt | 2026-04-07 | |
| Files | Original bundle
| |
| Publication available in collections: |