DSBT: Research on Soulbound Token Mechanism Based on Consortium Blockchain and Decentralized Identity

  • Conference paper
  • First Online:
Computational and Experimental Simulations in Engineering (ICCES 2023)

Part of the book series: Mechanisms and Machine Science ((Mechan. Machine Science,volume 145))

Abstract

Issues such as technology, application and future development based on blockchain have always been hot topics. Future forms such as Web3.0 and the Metaverse are inseparable from digital identities and virtual tokens. This paper focuses on the recently popular Soulbound Token (SBT), introduces the concepts of digital identity, blockchain, and Decentralized Identity (DID) related to it, analyzes the shortcomings and challenges of SBT, and combines the consortium blockchain and DID. A new concept of Soulbound Token (DSBT) based on the decentralized identity of the consortium blockchain is proposed, which aims to make up for the technical deficiencies of SBT, and through the new concept of Displayable Credentials (DCs), DSBT combines DID for identity authentication, The advantages of access, in turn, can realize the concept of “programmable privacy” expected by SBT. Finally, the co** mechanism is proposed for the possible risks of DSBT, the application scenarios of DSBT in the active health intelligent care platform for the elderly are listed, and the future development of blockchain, DID and DSBT is expected.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
EUR 29.95
Price includes VAT (Germany)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
EUR 213.99
Price includes VAT (Germany)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
EUR 267.49
Price includes VAT (Germany)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Yu, Z.: The 45th “statistical report on internet development in China” was released. China Broadcasting 05, 27 (2020)

    Google Scholar 

  2. Zhou, L., Chen, Q.: Current status and enlightenment of foreign network information security governance systems. Soc. Govern. 9, 71–78 (2020)

    Google Scholar 

  3. Sullivan, C., Burger, E.: Blockchain, digital identity, e-government. Bus. Transform. Blockchain II, 233–258 (2019)

    Article  Google Scholar 

  4. Cui, J., Lv, Y., Wang, H.: Development status of digital identity based on blockchain. Cyberspace Secur. 11(6), 25–29 (2020)

    Google Scholar 

  5. Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system. Decentral. Bus. Rev. 21260 (2008)

    Google Scholar 

  6. Zhang, K.: Research on logistics user privacy data protection and access rights management (Master's thesis, Southeast University) (2018)

    Google Scholar 

  7. Su, H., Wang, Y.: Research on trust-based service routing system in P2P environment. Comput. Appl. Res. 23(9), 230–233 (2006)

    Google Scholar 

  8. Potts, J., Rennie, E.: Web3 and the creative industries: how blockchains are resha** business models. In: A Research Agenda for Creative Industries, pp. 93–111. Edward Elgar Publishing (2019)

    Google Scholar 

  9. Zhao, Y., Qiao, Z.: Research on the development status of digital identity management based on blockchain. China Secur. (2022)

    Google Scholar 

  10. Drumond, R., Manu, S.Y., Dave, L., Christopher, A., Ryan, G., Markus, S.: Decentralized Identifiers (DIDs) v1.0 (2019). https://www.w3.org/TR/did-core/

  11. DID Development Center: DID Resolver (2020). http://did.baidu.com/did-resolver/

  12. Yao, Q.: A Preliminary study on self-management identity. Tsinghua Fin. Rev. (2022)

    Google Scholar 

  13. Yang, G., Liu, Y., Xu, H., **ng, H., Zhang, J., Li, E.: A blockchain-based trusted distributed identity authentication system for power grids. J. Netw. Inf. Secur. 7(6), 88–98 (2021)

    Google Scholar 

  14. **a, Y., Che, L., Wang, G., Liu, J.: Application of blockchain-based self-sovereign identity in learning behavior data management. Inf. Technol. Inform. (2021)

    Google Scholar 

  15. Manu, S.Y., Dave, L., David, C.: Verifiable Credentials Data Model 1.0. Technical Report. W3C, pp. 1–115 (2019). https://w3c.github.io/vcdata-model, https://www.w3.org/TR/vc-data-model/

  16. Sedlmeir, J., Smethurst, R., Rieger, A., Fridgen, G.: Digital identities and verifiable credentials. Bus. Inf. Syst. Eng. 63(5), 603–613 (2021)

    Article  Google Scholar 

  17. Li, W., Jiang, Z.: Research on the development and supervision of distributed accounts, blockchain and digital currency. Fin. Supervis. Res. 6(1), 12 (2018)

    Google Scholar 

  18. Yao, Q., Zhang, D.: A review of identity management technology in blockchain systems. J. Softw. 32(7), 2260–2286 (2021)

    Google Scholar 

  19. Shafiq, M., Tian, Z., Bashir, A.K., Du, X., Guizani, M.: CorrAUC: a malicious bot-IoT traffic detection method in IoT network using machine-learning techniques. IEEE Internet Things J. 8(5), 3242–3254 (2020)

    Article  Google Scholar 

  20. Decentralized Identifiers (DIDs) v1.0 (2020). https://www.w3.org/TR/did-core/

  21. Weyl, E.G., Ohlhaver, P., Buterin, V.: Decentralized society: finding web3’s soul (2022). Available at SSRN 4105763

    Google Scholar 

  22. Wang, M., Lu, J.: Blockchain technology and its application research in government governance. E-Govern. 2, 1–14 (2018)

    Google Scholar 

  23. Zhu, L., Yu, H., Zhan, S., Qiu, W., Li, Q.: Research on high performance alliance blockchain technology. J. Softw. 30(6), 1577–1593 (2019)

    Google Scholar 

  24. Hao, K., **n, J., Huang, D., Wang, G.: A decentralized distributed storage model. Comput. Eng. Appl. 53(24), 1–7 (2017)

    Google Scholar 

  25. Long, W.: Research on the construction and system of new data property rights. Tribune Polit. Sci. Law 35(4) (2017)

    Google Scholar 

  26. Tian, Z., Luo, C., Qiu, J., Du, X., Guizani, M.: A distributed deep learning system for web attack detection on edge devices. IEEE Trans. Industr. Inf. 16(3), 1963–1971 (2019)

    Article  Google Scholar 

  27. Ye, L.: Storage data mirroring technology and financial industry application analysis. Fin. Electron. 4, 60–62 (2009)

    Google Scholar 

  28. Wang, R., Tang, Y., Pei, X., Guo, S., Zhang, F.: Blockchain privacy protection scheme based on lightweight homomorphic encryption and zero-knowledge proof. Comput. Sci. S2, 547–551 (2021)

    Google Scholar 

  29. Qiu, J., Tian, Z., Du, C., Zuo, Q., Su, S., Fang, B.: A survey on access control in the age of internet of things. IEEE Internet Things J. 7(6), 4682–4696 (2020)

    Article  Google Scholar 

  30. Mao, Z.: Research and implementation of web application vulnerability detection method based on Web Crawler (Master’s thesis, Bei**g Jiaotong University) (2020)

    Google Scholar 

  31. Dwivedi, Y.K., Hughes, L., Baabdullah, A.M., Ribeiro-Navarrete, S., Giannakis, M., Al-Debei, M.M., Dennehy, D., Metri, B., Buhalis, D., Cheung, C.M., Conboy, K.: Metaverse beyond the hype: multidisciplinary perspectives on emerging challenges, opportunities, and agenda for research, practice and policy. Int. J. Inf. Manage. 66, 102542 (2022)

    Google Scholar 

  32. Liu, H., Ruan, N.: Research on attack methods in blockchain. J. Comput. Sci. 44(4), 786–805 (2021)

    Google Scholar 

  33. Chen, C.: The key technology of consortium blockchain and the regulatory challenges of blockchain. Power Equipment Manage. 11, 20–21 (2019)

    Google Scholar 

  34. Tian, Z., Li, M., Qiu, M., Sun, Y., Su, S.: Block-DEF: a secure digital evidence framework using blockchain. Inf. Sci. 491, 151–165 (2019)

    Article  Google Scholar 

  35. Sun, J.: Elderly care service system from the perspective of healthy aging: theoretical discussion and system conception. J. Huazhong Univ. Sci. Technol. (Soc. Sci. Edn.) 35(5), 1–8 (2021)

    Google Scholar 

  36. Shafiq, M., Tian, Z., Sun, Y., Du, X., Guizani, M.: Selection of effective machine learning algorithm and Bot-IoT attacks traffic identification for internet of things in smart city. Futur. Gener. Comput. Syst. 107, 433–442 (2020)

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported by the National Key R&D Program of China (Grant No.2020YFC2008700) and the Key-Area Research and Development Program OF Guangdong Province 2020B0101090003.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to **aofeng Chen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhang, Y., Zhang, L., Zhang, Q., Zheng, P., Jia, X., Chen, X. (2024). DSBT: Research on Soulbound Token Mechanism Based on Consortium Blockchain and Decentralized Identity. In: Li, S. (eds) Computational and Experimental Simulations in Engineering. ICCES 2023. Mechanisms and Machine Science, vol 145. Springer, Cham. https://doi.org/10.1007/978-3-031-42987-3_34

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-42987-3_34

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-42986-6

  • Online ISBN: 978-3-031-42987-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics

Navigation