RESEARCH OF A HYBRID ACCOUNTING DATA MANAGEMENT SYSTEM BASED ON THE COMBINATION OF DID, IPFS, BLOCKCHAIN TECHNOLOGIES

Authors

DOI:

https://doi.org/10.28925/2663-4023.2025.31.1033

Keywords:

DID; IPFS; blockchain; privacy; decentralization; smart contracts; IPNS; DNSLink.

Abstract

This paper examines the concepts of decentralized identifiers and associated credentials, the system for managing such data, and the differences between traditional and decentralized identifiers. In addition, the advantages and disadvantages of decentralized identifiers that already exist are considered and a solution to the challenges facing such identifiers is sought. The challenges facing decentralized identities include the problem of key management, implementation complexity, regulatory uncertainty, cost of operational support, and ease of use. To address these problems, a system concept using a hybrid approach is proposed, which is characterized by using a combination of client-server architecture for storing credentials in IPFS and fingerprints in the blockchain, the immutability of which should protect against the use of fake credentials. Methods for binding IPFS data to a persistent identifier that can point to different data are also compared: IPNS, DNSLink, ENS. Based on this, we developed the ENS-IPFS model of a decentralized identifier and demonstrated a way to integrate such a decentralized model into a hybrid credential management system. During the development of the system, we also developed a mathematical-logical apparatus that allows us to determine whether a credential belongs to a set of reliable ones, and described the algorithm of user authentication through the use of a fingerprint of his credential and solving a cryptographic problem to prove that he owns a private key, on the basis of which a public key was formed, which, in combination with the data identifier, forms a fingerprint that is checked for compliance with what is stored in the blockchain. The results of the study allowed us to confirm the hypothesis about the possibility of using hybrid technologies in the context of using decentralized technologies and credential management. In addition, the data obtained allowed us to form paths for further research and to form a conclusion about the possibility of applying the approach as one that has prospects for parallel application with centralized and decentralized systems and can also play an intermediate link in the transition from a centralized to a decentralized model.

Downloads

Download data is not yet available.

References

Baklykov, M. I. (2024). Efficiency of using IAM system at the enterprise. Connectivity, 167(1). https://doi.org/10.31673/2412-9070.2024.014851

Makhdoom, I., Zhou, I., Abolhasan, M., Lipman, J., & Ni, W. (2020). PrivySharing: A blockchain-based framework for privacy-preserving and secure data sharing in smart cities. Computers & Security, 88, 101653. https://doi.org/10.1016/j.cose.2019.101653

Zaeem, R. N., & Barber, K. S. (2020). The effect of the GDPR on privacy policies. ACM Transactions on Management Information Systems, 12(1), 1–20. https://doi.org/10.1145/3389685

Cucko, S., & Turkanovic, M. (2021). Decentralized and self-sovereign identity: Systematic mapping study. IEEE Access, 9, 139009–139027. https://doi.org/10.1109/access.2021.3117588

Poberezhnyk, V., Balatska, V., & Opirskyi, I. (2024). The concept of self-sovereign identity as an alternative to traditional authentication methods. In Cybersecurity and information technology. CIT 2024: Collection of scientific papers of V International Scientific and Practical Conference.

What is EBSI - EBSI -. (б. д.). European Commission. https://ec.europa.eu/digital-building-blocks/sites/spaces/EBSI/pages/590447955/What+is+EBSI

Fdhila, W., Stifter, N., Kostal, K., Saglam, C., & Sabadello, M. (2021). Methods for decentralized identities: Evaluation and insights. У Lecture notes in business information processing (с. 119–135). Springer International Publishing. https://doi.org/10.1007/978-3-030-85867-4_9

Mohamed*, M. H., Sobky, W. I. E., & Hamdy, S. (2021). Elliptic curve digital signature algorithm challenges and development stages. International Journal of Innovative Technology and Exploring Engineering, 10(10), 121–128. https://doi.org/10.35940/ijitee.j9433.08101021

Sporny, M., Longley, D., Sabadello, M., Reed, D., Steele, O., & Allen, C. (2022, 19 липня). Decentralized identifiers (dids) v1.0. W3C. https://www.w3.org/TR/did-1.0/

How IPFS works | IPFS Docs. (б. д.). IPFS Documentation | IPFS Docs. https://docs.ipfs.tech/concepts/how-ipfs-works/#subsystems-overview

Rosenbaum, R. (1993, травень). RFC 1464: Using the domain name system to store arbitrary string attributes. IETF Datatracker. https://datatracker.ietf.org/doc/html/rfc1464

Balatska, V., Рoberezhnyk, V., & Opirskyy, I. (2024). Use of non-fungible tokens and blockchain to demarcate access to public registries. Cybersecurity: Education, Science, Technique, 4(24), 99–114. https://doi.org/10.28925/2663-4023.2024.24.99114

Balduf, L., Korczyński, M., Ascigil, O., Keizer, N. V., Pavlou, G., Scheuermann, B., & Król, M. (2023). The cloud strikes back: Investigating the decentralization of IPFS. У IMC '23: ACM internet measurement conference. ACM. https://doi.org/10.1145/3618257.3624797

Downloads


Abstract views: 10

Published

2025-12-16

How to Cite

Poberezhnyk, V., & Nakonechnyi, T. (2025). RESEARCH OF A HYBRID ACCOUNTING DATA MANAGEMENT SYSTEM BASED ON THE COMBINATION OF DID, IPFS, BLOCKCHAIN TECHNOLOGIES. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 3(31), 441–459. https://doi.org/10.28925/2663-4023.2025.31.1033