Publication:

Pseudonymity for Personal Data Stores: Pseudonymous WebIDs and Decentralized Identifiers

 
cris.virtual.department#PLACEHOLDER_PARENT_METADATA_VALUE#
cris.virtual.department#PLACEHOLDER_PARENT_METADATA_VALUE#
cris.virtual.orcid0000-0001-7445-1881
cris.virtual.orcid0000-0003-0248-0987
cris.virtualsource.departmentcb5e873e-e9c6-4e54-b031-fe215dc067a0
cris.virtualsource.department54a7efb9-d406-4578-a72e-be6a136a978a
cris.virtualsource.orcidcb5e873e-e9c6-4e54-b031-fe215dc067a0
cris.virtualsource.orcid54a7efb9-d406-4578-a72e-be6a136a978a
dc.contributor.authorDe Mulder, Gertjan
dc.contributor.authorBen De Meester
dc.date.accessioned2026-04-14T07:07:56Z
dc.date.available2026-04-14T07:07:56Z
dc.date.createdwos2025-11-25
dc.date.issued2025
dc.description.abstractPersonal Data Stores like Fedora and Solid let users become data holders, controlling their personal data and Web interactions through interoperable standards. Pseudonyms protect privacy during data sharing while still allowing holders to later prove their true identity, making them key privacy-enhancing tools. However, pseudonyms are rarely tackled in existing decentralized personal data sharing standards. In this paper, we present, analyze, and evaluate pseudonymity methods within Solid – a maturing set of personal data sharing standards – applied to a job application use case. This use case consists of three flows: a pseudonym generation flow, a diploma verification flow using that pseudonym and data minimization using the Verifiable Credential standard, and a Proof of Ownership identity binding between the pseudonym and the user’s true identity. We compare two pseudonym generation solutions: a Solid-native solution that depends on an external party to lease (Web-resolvable) pseudonyms, and a solution that leverages a static resolving method (DID:Key) to generate ephemeral pseudonyms. The data flow diagrams, and STRIDE and LINDDUN analysis indicate that static identifiers are better for pseudonymous use cases, as they avoid reliance on external parties. The requirement validation show both solutions meet most needs, though the WebID solution remains observable and the DID:Key solution lacks support for deleting or managing pseudonyms. With this pseudonymity work, we aim to provide a next step to combine personal data storage incentives with Wallet incentives (such as those put forward by the EUDI).
dc.description.wosFundingTextThe described research activities were supported by SolidLab Vlaanderen (Flemish Government, EWI and RRF project VV023/10). imec ICON project SHARCS (Agentschap Innoveren en Ondernemen project nr. HBC.2022.0543), and Interreg project SecuWeb (0100085). The authors thank Vincent Naessens, Ruben Verborgh, and Pieter Colpaert for their valuable feedback.
dc.identifier.doi10.1007/978-3-032-00639-4_7
dc.identifier.isbn978-3-032-00638-7
dc.identifier.issn0302-9743
dc.identifier.urihttps://imec-publications.be/handle/20.500.12860/59074
dc.language.isoeng
dc.provenance.editstepusergreet.vanhoof@imec.be
dc.publisherSPRINGER INTERNATIONAL PUBLISHING AG
dc.source.beginpage111
dc.source.conferenceAVAILABILITY, RELIABILITY AND SECURITY, ARES 2025
dc.source.conferencedate2025-08-11
dc.source.conferencelocationGhent, Belgium
dc.source.endpage129
dc.source.journalAVAILABILITY, RELIABILITY AND SECURITY, ARES 2025, PT IV
dc.source.numberofpages19
dc.title

Pseudonymity for Personal Data Stores: Pseudonymous WebIDs and Decentralized Identifiers

dc.typeProceedings paper
dspace.entity.typePublication
imec.internal.crawledAt2026-04-07
imec.internal.sourcecrawler
imec.internal.wosCreatedAt2026-04-07
Files

Original bundle

Name:
DS998.pdf
Size:
1.44 MB
Format:
Adobe Portable Document Format
Description:
Published
Publication available in collections: