Next Article in Journal
A Finite State Automaton for Green Data Validation in a Real-World Smart Manufacturing Environment with Special Regard to Time-Outs and Overtaking
Previous Article in Journal
The 6G Ecosystem as Support for IoE and Private Networks: Vision, Requirements, and Challenges
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Digital Management of Competencies in Web 3.0: The C-Box® Approach

1
Pomiager S.r.l., 40137 Bologna, Italy
2
Department of Sciences and Methods of Engineering, University of Modena and Reggio Emilia, 42122 Reggio Emilia, Italy
*
Author to whom correspondence should be addressed.
Future Internet 2023, 15(11), 350; https://doi.org/10.3390/fi15110350
Submission received: 15 September 2023 / Revised: 12 October 2023 / Accepted: 24 October 2023 / Published: 26 October 2023
(This article belongs to the Section Techno-Social Smart Systems)

Abstract

:
Management of competencies is a crucial concern for both learners and workers as well as for training institutions and companies. For the former, it allows users to track and certify the acquired skills to apply for positions; for the latter, it enables better organisation of business processes. However, currently, most software systems for competency management adopted by the industry are either organisation-centric or centralised: that is, they either lock-in students and employees wishing to export their competencies elsewhere, or they require users’ trust and for users to give up privacy (to store their personal data) while being prone to faults. In this paper, we propose a user-centric, fully decentralised competency management system enabling verifiable, secure, and robust management of competencies digitalised as Open Badges via notarization on a public blockchain. This way, whoever acquires the competence or achievement retains full control over it and can disclose his/her own digital certifications only when needed and to the extent required, migrate them across storage platforms, and let anyone verify the integrity and validity of such certifications independently of any centralised organisation. The proposed solution is based on C-Box®, an existing application for the management of digital competencies that has been improved to fully support models, standards, and technologies of the so-called Web 3.0 vision—a global effort by major web organisations to “give the web back to the people”, pushing for maximum decentralisation of control and user-centric data ownership.

1. Introduction

The term “Human Resources” (HR) refers to the department or business function within a company that is responsible for managing and developing its workforce. Its main goal is thus to attract, develop, and retain the best talent available. The same can be easily said for learning institutions such as universities. To achieve this, HR needs a clear understanding of the skills necessary for the organization to function effectively as well as an understanding of the organization’s internal competencies. By identifying employees (students, for universities) with specialized competencies or relevant experience, the company can effectively address changes or implement new business functions and strategies. This fosters the company’s ability to adapt quickly and remain competitive in the marketplace.
According to Andrew Spencer, a UK-based HR technology consultant/researcher, the four areas where blockchain can be used more proficiently in this context are credential verification, worker payments, work matching platforms, and identity management [1]. The former and the latter are the two we focus on in this paper with our proposed C-Box® platform.
The prevalent practice of verifications is generally handled by inner administrative human resources and/or assigned to third parties, and applicants provide contact information [1]. Talent supply, candidate fraud, and selection bias were identified as the most pressing problems that blockchain can solve in HR management by the study conducted in [2]. In particular, verification of educational career achievement, expertise acquired from previous jobs and performance thereof, as well as data sharing are the concerns mostly represented amongst surveyed participants from the HR sector.
Therein, implementation is seen as the bigger barrier to overcome for full exploitation: hence, the relevance of platforms such as C-BoX® that can be readily exploited by organisations and individuals, either manually (via a Graphical User Interface) or automatically via an integration API provided by the platform—such as the “Web API” component in C-Box® (see Section 3.2).
The ability to certify, identify, and track people’s competencies is a fundamental activity for both individuals and companies. In this context, Open Badges for the digital certification of competence play a fundamental role, as they provide the softwarised representation of a given competence together with metadata about ownership, issuer organisation, and the acquisition process [3].
However, keeping track of an organization’s internal competencies can be a challenge [4], especially for large companies with many employees and different divisions or locations. In addition, if the company has a well-defined hierarchical structure, it can be straightforward to identify employee competencies based on roles and responsibilities, but in more flexible and agile organizations, where employees can perform multiple tasks and roles, competency management may require a more flexible and adaptable approach. Usage of software technology, such as HR management software or competency management platforms, can streamline the competency tracking process, as these tools allow the recording and updating of employee competency information, making it easy to find and access that information when needed [5].
From the standpoint of employees and students alike, competency tracking is relevant also across organisations. For instance, when changing jobs or applying for college, information on the competencies acquired remains primarily in the hands of the previous company/school if it has been collected through internal training programs or performance evaluations. Also, the HR department or school administration may have no incentive to communicate to the employee, the new company, or other education institutions the competencies acquired. Some companies adopt open and transparent policies, allowing employees to access and maintain records of the competencies acquired during their employment. An example is represented by the web portal promoted by Unioncamere and the Chambers of Commerce in Italy: it allows the registration of competencies to an independent, accredited portal (https://certificacompetenze.unioncamere.it/, accessed on 23 October 2023). Independent competency management systems therefore safeguard the interests of the worker, who will be able to continue to access his/her certificates even after the termination of the employment relationship. However, these independent systems mostly are centralized; hence, the worker still depends on a single external authority that holds complete control of his/her own data [6,7,8]. In addition, keeping data in one place increases the risk of data loss due to technical failures, human error, or cyberattacks. Finally, employees/students are forced to share sensitive information about their competencies with the authority, raising concerns in terms of data privacy and security as that authority has control of and responsibility for protecting that information.
The emergence of blockchain technology [9] and of the concept of Self-Sovereign Identity (SSI) [10,11] provide individuals with new ways to manage their own data, including competencies. These technologies make it possible to create verifiable and immutable digital records that can be inspected by multiple parties while respecting privacy and without giving up control to a single organisation; rather, data are fully distributed and decentralised. The move to decentralized, self-managed systems addresses the limitations associated with centralized systems, allowing employees to maintain control and ownership of their competencies while making it easier, more privacy preserving, and safer to share relevant information during job changes.
Accordingly, in this paper, we propose a user-centric, fully decentralised competency management system enabling verifiable, secure, and robust management of competencies digitalised as Open Badges via notarization on a public blockchain. This way, whoever acquires the competence or achievement retains full control over it and can disclose his/her own digital certifications only when needed and to the extent required, migrate them across storage platforms, and let anyone verify the integrity and validity of such certifications independently of any centralised organisation. The proposed solution is based on C-Box® (https://www.cboxiqc.com/, accessed on 23 October 2023), an existing application for the management of digital competencies developed by Italian Quality Company s.r.l. (IQC) in technological partnership with Pomiager s.r.l. C-Box® is designed for the management of Open Badges, which represent a digital recognition of the competencies or achievements obtained by an individual, and it allows issuers qualified by IQC to create and issue Open Badges to learners/employees who demonstrate that they have acquired specific competencies. C-Box® has been extended to fully support models, standards, and technologies of the so-called Web 3.0 vision—a global effort by major web organisations to “give the web back to the people”, pushing for maximum decentralisation of control and user-centric data ownership. In particular, our contributions can be articulated as follows:
  • We describe the notarization service implemented on a public blockchain to ensure immutability and decentralized verification of the information reported in the Open Badges.
  • We demonstrate that such implementation fully adheres to the requirements of the Self-Sovereign Identity (SSI) model to enable full ownership and control of the competencies acquired by learners/employees.
  • We motivate the addition of Non-Fungible Tokens (NFTs) [12] to Open Badges as they enhance their portability and interoperability and stimulate user engagement.
The remainder of this paper is organised as follows: in Section 2, we provide to the reader the necessary background to fully appreciate our contribution: that is, what Open Badges are, what the paradigm of SSI is and why it is central to Web 3.0 developments, and what role the blockchain may play in competency management; in Section 3, we describe our contribution: that is, the solution developed and how it supports notarization and creation and verification of Open Badges, and how NFTs are exploited.

2. Background

This section provides the preliminary knowledge needed to fully appreciate the C-Box® technology presented in Section 3: what Open Badges are (Section 2.1), how the concept of Self-Sovereign Identity (SSI) relates to them (Section 2.2), and why the blockchain, Verifiable Credentials, and Non-Fungible Tokens (NFTs) are convenient choices for their software implementation (Section 2.3).

2.1. Open Badges

An Open Badge is a digital certificate that allows users to recognize and represent a person’s competencies in a transparent and portable way [3]. Open badges consist of an image that represents the recognition itself, accompanied by detailed metadata that provide additional information about the competency or goal achieved, such as information about the issuer of the badge, its recipient, the award criteria, a thorough description of the competence or achievement obtained, and the date of issue. The most important feature of an Open Badge is its portability: once it is obtained, a person can keep it and share it on different digital platforms, such as social media, online resumes, or personal portfolios. This allows individuals to effectively present their competencies and accomplishments to potential employers, educators, or community members.
To achieve such portability, Open Badges are based on an open technical standard: the Open Badges standard—originally created by the Mozilla Foundation (https://web.archive.org/web/20160426204303/https://openbadgespec.org/ archived from the no longer accessible original page, accessed on 23 October 2023) and now maintained and developed by the 1EdTech organisation—defines a software format for Open Badges, including the badge image, associated metadata, and how it must be managed and shared. As an example, Figure 1 shows a representation of an Open Badge with JSON metadata—a lightweight data representation format particularly suitable for web applications.
Version 3.0 of Open Badges was published in July 2023 (https://1edtech.github.io/openbadges-specification/ob_v3p0.html, accessed on 23 October 2023), introducing several new features and improvements towards realising the vision of Web 3.0: that is, a global effort by major web organisations to “give the web back to the people”, pushing for maximum decentralisation of control and user-centric data ownership. This update included:
  • Support for Verifiable Credentials (VCs)—see Section 2.2.2;
  • Interoperability with digital wallets capable of hosting users’ VCs;
  • A greater focus on data privacy and security through the use of technologies such as end-to-end encryption and data management based on user consent;
  • Support for Linked Data (via the representation format JSON-LD), a technology that allows linking of the information contained in digital badges to other information on the web in order to provide a broader context.
Open Badges offer numerous advantages in mapping the competencies acquired by people in all training and experiential contexts, such as (i) detailed documentation of the knowledge and competencies acquired, (ii) digital portability, (ii) easy sharing, and (iv) automated verifiability—a process that guarantees the authenticity and validity of a badge awarded to a person: that is, whether the badge has been actually issued and by what organization, and that the badge has not been altered or counterfeited. As such, they have established themselves as the de-facto standard for recognising and assessing individual competencies in a transparent and certifiable way.
However, the validity of an Open Badge is closely bound to the fate of the platform that issued it in the first place: if, for any reason, such a platform discontinues its service, gets hacked, or loses data, the badge would no longer be transportable and/or verifiable [13]. Decentralized systems such as blockchains, in which the verification process does not depend on the database of the issuing platform but on all the peer nodes participating in the network, and Web 3.0 paradigms such as SSI, where users have independently stored and verifiable credentials, can fix this issue. Accordingly, C-Box® implements a notarization service and a VCs scheme—that is, verifiable and secure tracking of identities, processes, and data—in a public blockchain so as to decouple badges from issuers’ platforms and add a further security layer (as described in Section 3).

2.2. Self-Sovereign Identity (SSI)

Self-Sovereign Identity (SSI) is a cornerstone of Web 3.0 [10], as it represents an innovative approach to digital identity management that aims to remove dependency on centralized third parties and focuses on autonomy and ownership by individuals. These identities are verified and recognized by different organizations and online services, allowing users to interact securely and privately without having to reveal sensitive information. Users have the power to decide what information to share, with whom, and for how long.
SSI is based on the concept of Decentralized IDentifiers (DIDs) [14] and Verifiable Credentials (VCs) [15], which allow individuals to create and manage their own digital identity that can be verified by others without revealing unnecessary personal information. But then we must ask how can this new freedom and the need to protect our privacy coexist. The answer is via Zero-Knowledge Proof (ZKP) [16], which allows the verification of information without revealing sensitive details.
The C-Box® certificates issued via VCs can vouch for the specific competencies they represent, which is entirely consistent with the principles of Self Sovereign Identity. This approach enables individuals to possess and manage their attestations from their personal wallet, rendering the verification processes independent of the issuing platforms.

2.2.1. Zero-Knowledge Proof (ZKP)

In cryptography, a Zero-Knowledge Proof (ZKP) [16] is a method by which one party (the demonstrator) can prove to another party (the verifier) that a given statement is true while avoiding transmission of any additional information beyond the fact that the statement is actually true. In general, when a person wants to prove that he knows something, the simplest solution would be to simply reveal the information itself. For example, if someone claims to know a secret password, they could simply reveal it to prove they have that knowledge. However, the goal of ZKP is to demonstrate knowledge without revealing that knowledge. For achieving this, the verification process generates one or more “challenges” (or “proofs”) that an individual is able to overcome only if in possession of that specific information. Fully describing such challenges is out of the scope of this paper; it is sufficient to know that they rely on encryption algorithms that allow calculations to be performed on encrypted information without the need to decrypt it. The tools that allow ZKP verification of a statement in an SSI context are Verifiable Credentials (VCs) and Decentralised Identifiers (DID).

2.2.2. Verifiable Credentials (VCs)

A Verifiable Credential (VC) [15] is a standardized data format for representing claims that can be digitally verified. VCs can be used to represent virtually any attestation or statement, from academic or professional qualifications to citizenship. The verifiable data registry is the system that mediates the creation and verification of identifiers, cryptographic keys, and other relevant data that may be required to actually verify credentials. The use of VCs follows a three-party model as described in Figure 2: an issuer, a holder, and a verifier.
The issuer digitally signs the VC, which can then be saved on the holder’s wallet—a web or mobile app specifically designed to allow saving of VCs and that relies on standard JSON schemes registered and available in the verifiable data registry. A verifier that wants to validate the VC must trust the issuer: it must be a reliable entity capable of issuing the specific credentials relevant to the claim included in the VC. If such trust exists, the verifier can verify the signature on the VC provided by the holder without the need to make any request to the issuer platform.

2.2.3. Decentralized Identifiers (DIDs)

Decentralized Identifiers (DIDs) [14] play a key role in the VC model, especially when combined with ZKP. A DID is a unique identifier that can be registered and managed by the holder itself without the need for an issuing authority. This DID is used to create a sort of digital profile, called a DID Document, that can contain arbitrary data and pointers to services related to the identity of the holder. DIDs perform two main functions:
  • Authentication: when the owner presents a VC to a verifier, it can use its DID to prove its identity.
  • Verification: since each VC contains a reference to the issuer’s DID, the verifier can check whether the issuer’s digital signature is valid.
If both checks are passed, one can be sure that the VC actually belongs to the holder and that the VC has been actually issued by the issuer to that holder. DIDs therefore provide a method to authenticate both the owner and the issuer in a fully decentralized way, respecting the principle of SSI and thus the vision of Web 3.0.
Through DID it is possible to sign and verify “verifiable credentials”, i.e., to create and resolve cryptographically secure evidence that attests to certain personal information such as age, qualifications, or work history. These credentials may be shared with third parties, such as employers, financial institutions, or government agencies, who can verify their authenticity without having to access other personal information.

2.2.4. Verifiable Presentation

A verifiable presentation [17] is a safe way to share VCs; it tells the verifier only what it is required to know and allows the owner to maintain different identities, such as online player, professional, etc., while only disclosing the one actually necessary at any given time. Technically, a verifiable presentation consists of three components:
  • Presentation metadata that provide information about the presentation itself (such as data types and storage requirements);
  • A list of VCs;
  • The DID of the holder and (all of) the issuer(s) necessary to validate the authenticity of the statements.
To create a presentation, the holder must first access his/her wallet and select which statements he/she wants to add to the verifiable presentation. The holder then digitally signs the presentation to be transmitted to the verifier, who can proceed with the verification; by checking the holder’s signature (available in his/her DID) on the presentation, the verifier confirms that the VCs belong to the holder, whereas by checking the individual VCs, the verifier guarantees that they are valid and that they have been issued by the indicated issuers.
C-Box® integrates a system for generating Verifiable Presentations, offering users the ability to create detailed and modular presentations of their skills. These presentations, structured as VCs, can be shared with third parties, such as employers or educational institutions, to attest to and demonstrate the individual’s skills and knowledge.

2.3. Blockchain

Blockchain technology is essentially a distributed ledger with built-in transparency, decentralisation of governance, and security against tampering. Blockchains that support smart contracts also add the possibility to program general-purpose applications on top of them, and these are executed in a fully decentralised way.
In the following, we briefly describe the two main blockchain ingredients we use for C-Box®: smart contracts for notarization and NFTs.

2.3.1. Notarization

Notarization is the process that guarantees the immutability and authenticity of a document or set of data through the registration of a hash (or “fingerprint”) of the document on a public or private blockchain. The process of notarization on a blockchain consists of several phases:
  • Definition of the document: the document is created by the user and can be a text file, an image, a video, a transaction, etc.
  • Hash calculation: the user calculates the hash of the document, which is the unique alphanumeric code that represents the fingerprint of the document itself.
  • Inserting the hash into the transaction: the user inserts the hash of the document into a blockchain transaction by notarizing it.
  • Verification of authenticity: at a later time, a third-party user can verify the authenticity of the document by hashing it and comparing it with the one originally registered on the blockchain.
Note that even if notarization requires the use of a distributed system, any privacy requirements demanded by the issuer or learner are respected. In fact, the process distributes on the blockchain only the hash of the data and never its content in the clear.
There are two main categories of blockchains: public blockchains and private blockchains. Public blockchains, such as Bitcoin and Ethereum, are decentralized and open to anyone who wants to participate in the network. This means that data on the blockchain are public and accessible to anyone. Private blockchains instead are controlled by a specific (group of) organization(s), which means that only authorized users can access the network.
Notarization may be implemented on both; however, a private blockchain requires trust in the blockchain technology itself (its consensus protocol, security measures adopted, etc.) as well as in the organisation(s) running the blockchain, whereas notarization on a public blockchain only requires trust in the blockchain platform itself. The price is publicity of data: no sensitive data must be stored on a public blockchain, as they will be open to scrutiny by anyone. Since in the notarization process implemented by C-Box® only a hash code computed on a given piece of data is stored on the blockchain and there is no way to trace the content of such data back from the hash code, a public blockchain is chosen as the backbone of the C-Box® application.
There is currently no recognized standard for notarizing documents on blockchain [18,19]. There are several independent implementations available on the market, but each uses a different approach and data structure. This can make it difficult to set up an interoperable system that allows different notarization services to communicate with each other. In addition, the lack of standards can make it difficult to choose the right notarization solution, as there can be significant differences between implementations in terms of security, cost, and ease of usage. Accordingly, several projects and initiatives are working to develop blockchain notarization standards in hopes of creating an interoperable and universal notarization ecosystem. For example, ISO has set up a committee to define guidelines for blockchain technologies and distributed ledgers, but no standards have yet been released (https://www.iso.org/committee/6266604.html, accessed on 23 October 2023). Instead, on Joinup—a collaboration platform created by the European Commission for the definition of interoperability solutions for public administrations—you can find a file-notarization project (Blockchain Based Notary Proof Of Concept), but at the moment, there are no practical implementations (https://joinup.ec.europa.eu/collection/blockchain-egov-services/solution/blockchain-based-notary-proof-concept/about, accessed on 23 October 2023).
In conclusion, besides standards, also no dominant design seems to have emerged yet. For C-Box®, we therefore had to develop our own notarization service for the validation of the information contained in the Open Badges (see Section 3).

2.3.2. Non-Fungible Tokens (NFTs)

Non-Fungible Tokens (NFTs) are a type of cryptographic token that represents ownership of a unique digital object or work [12]. Unlike fungible tokens, NFTs are distinct and cannot be exchanged equivalently with each other. Each NFT has a unique identifier registered on the blockchain, which guarantees the authenticity, traceability, and ownership of the digital object represented [20]. NFTs offer owners new ways to monetize their digital assets as they represent a form of exclusive ownership and digital authenticity. For example, an artist can create a unique digital artwork and sell the NFT that represents it to a collector. In this way, the buyer of the NFT owns the digital artwork and the artist can earn a commission on the sale of the NFT. This allows owners to derive additional revenue from the resale of their digital assets.
NFTs and VCs are both emerging concepts within blockchain, and while they share a technology base, they have distinct purposes and applications (Table 1 summarizes the differences between NFTs and VCs.). In essence, NFTs are digital certificates of ownership. VCs, on the other hand, are a technology standardized by the World Wide Web Consortium (W3C) to represent and share attributes or rights of a digital identity. A key difference is that VCs require a three-party infrastructure to work properly: the issuer, the owner, and the verifier. NFTs, on the other hand, are based on the blockchain and are time-marked, which makes it easy and accessible to verify the digital ownership of the token. Another difference regards transferability: although the owner can decide where and how to share a VC, its ownership never changes. NFTs, instead, allow owners to sell, exchange, or give away the digital object represented by the token. However, in the face of a change of ownership the content of the token does not change. So regardless of the owner of the wallet to which an NFT is associated, the NFT of a certificate associated with a natural person will always remain associated with the same person. NFTs require a blockchain to be realised, while VCs can be implemented on blockchain or any other distributed storage platform that supports the required verification. Finally, an NFT is inherently indivisible due to the specific nature of the digital asset it represents. This stems from the fact that splitting the unique digital asset would compromise its intrinsic value and uniqueness. In the case of VCs, they can be divided while sharing. For example, suppose a VC contains an individual’s date of birth and driver’s license number. The holder can choose to share only the driver’s license number with one verifier and only the date of birth with another. In this sense, VCs are divisible.
In C-Box® we foster an interpretation of NFTs and VCs as complementary concepts: in the context of competency management, in fact, NFTs can be associated to VCs to (i) incentivise users to acquire new competencies to be showcased, (ii) further decouple ownership of a competence (a responsibility of VCs) from ownership of the certification of such competence (to which NFTs may add value), (iii) improve interoperability, as NFTs are widely supported by all the major public blockchain platforms, and potentially (iv) allow users to generate revenues from ownership of their certificates. For instance, let us imagine that Professor J. R. R. Tolkien (the famous author of “The Lord of the Rings”) is still alive today and that a literary award obtained by him has been notarised to a blockchain. Such a digitalised award would be bound to Prof. Tolkien’s VCs to always and forever prove that such an award has been indeed achieved by him and not by another homonym. However, ownership of such a digital certificate (the certification of the award, not the award itself) may be valuable to estimators and collectors of Tolkien’s memorabilia. Hence, digitalising such ownership as an NFT, decoupled from the award certificate itself (that would still “belongs” to Prof. Tolkien, even after his death), provides unprecedented market opportunities.

3. The C-Box® Platform

In this section, we present our contribution: that is, the C-Box® platform for distributed and decentralised competency management. First, we enumerate the main goals and functionalities of the platform; then, we overview its conceptual architecture by describing its main components and their relationships; afterwards, we describe in detail its core processes: that is, notarisation, handling of VCs, and NFT usage.

3.1. Overview

C-Box® is an online platform designed to allow issuers to award digital skill recognitions to “learners” (or “holders”) through Open Badges. These badges can be granted for various reasons, such as the completion of training programs, participation in specific events, or in acknowledgment of skills acquired in a professional setting or based on the roles undertaken. The C-Box® platform adheres to the standards set by 1EdTech concerning the specifications of Open Badges 2.0. This means that holders have the flexibility to import and export Open Badges to and from other platforms that follow the same standard, ensuring great interoperability and simplifying the sharing and recognition of skills across platforms. A unique feature of C-Box® badges is the ability to embed multimedia attachments, such as handouts or videos, directly within the badge in order to enrich the badge’s content and provide additional evidence or details of the acquired skills.
C-Box® also already integrates a notarization service, currently based on a private blockchain, that ensures the authenticity and immutability of certifications over time. Unlike with public blockchains, using a private one eliminates the need to spend cryptocurrency for the notarization of each certification. This represents a cost-effective advantage. However, there is a downside: the private nature of the blockchain restricts access and consultation by entities external to the C-Box® platform. This hinders the transparency benefits typically associated with blockchain technology, as the data are not freely available to the public.
The notarization service has thus been re-engineered on a public blockchain in the way that we describe in the remainder of this section. Also, with the aim of increasing interest and engagement for learners, an option has been added for C-Box attestation holders to redeem NFTs representing the received open badge. Finally, given that the most-recent version of the Open Badge standard requires the use of VCs, the platform has chosen to implement this SSI technology.
The choice was driven by the desire to leverage the inherent advantages of a public blockchain, such as increased robustness to faults and absolute transparency, making the information accessible to external users. However, transitioning to a public blockchain presents challenges. One of the main ones is managing the monetary cost (in cryptocurrency) associated with transactions and smart contract execution. This calls for a thorough review of procedures and smart contracts’ source code to ensure resource-efficient use and cost minimization. Furthermore, another pivotal aspect is privacy. With the shift to a public blockchain, it is crucial to ensure that users’ sensitive information remains protected and that their privacy is not jeopardized.

3.2. Architecture

C-Box® consists of two main components (Figure 3): one that exposes APIs to its many services, such as notarization and Open Badges management (“Web API”), and another one that provides the web interface for human users (“Web Application”).
The Web API component includes the Blockchain Service, which interacts with the Polygon blockchain through a node provider called Alchemy (https://docs.alchemy.com/reference/api-overview, accessed on 23 October 2023), that receives API requests and automatically returns the responses. Polygon has been chosen for many reasons. First, Polygon ID is a useful tool to implement a Self-Sovereign Identity (SSI) infrastructure in a decentralized context. Although it was not originally developed with a specific orientation towards Open Badges 3.0, it proves capable of meeting many of the requirements of this standard. Moreover, Polygon is a second-layer blockchain, meaning it operates on top of a primary blockchain like Ethereum, offering a scaling solution. This characteristic brings with it two significant advantages. Firstly, transactions on Polygon are considerably faster. While primary networks can suffer from congestion, leading to transaction delays, Polygon, due to its structure, manages to process transactions with greater efficiency and speed. Secondly, another tangible benefit of using Polygon is the reduced transaction cost. Primary networks, especially during times of high demand, can have high fees. In contrast, Polygon offers significantly lower transaction fees, making operations not only faster but also more cost-effective. These two aspects combined make Polygon a preferable choice for many seeking efficiency and affordability in the blockchain. Finally, Polygon allows for the management of Verifiable Credentials (VCs) and the implementation of claim verification in accordance with Web 3.0 principles and technologies.
In the context of our re-engineering of C-Box®, we adapted and applied Polygon functionalities to issue competencies in the form of badges thanks to its ability to meet the standards imposed by Open Badges 3.0. On purpose, we use two services provided by Alchemy: one that exposes an endpoint useful for querying a node via Remote Procedure Call (RPC), and one that provides web hooks to react to transactions made to a specific RPC endpoint. For each issuer with a subscription to C-Box®, an Issuer Node is created on Polygon. Each issuer node provides an API meant to support Decentralised Identifier (DID) creation and management, such as defining new credential schemes, and creating and verifying VCs. The issuer node also has a database that stores the DID identities and the VCs, while a secure vault is used to store sensitive issuer information, such as the private key of its wallet (to allow it to sign blockchain transactions).
In Figure 3, two external applications are also depicted in order to comprehensively depict the overall working logic of C-Box® explained in the following sections. The VC Holder Wallet is an application capable of storing and managing user credentials. It can be either C-Box®’s custom one or Polygon ID’s one (e.g., https://play.google.com/store/apps/details?id=com.polygonid.wallet, accessed on 23 October 2023). Based on the principles of SSI, the wallet enables its holder to carefully select which data to share with others without exposing other sensitive private information (in compliance with verifiable presentation principles). Metamask (https://metamask.io/, accessed on 23 October 2023) instead is an extension that any user can add to her/his browser to create and interact with his/her own wallet via the Web.
Finally, as regards ZKP, to both generate and verify ZKPs, the Iden3 framework (https://docs.iden3.io, accessed on 23 October 2023) has been used. It is an open-source framework that employs various tools developed to operate in decentralized environments with reduced trust. Specifically, Iden3 uses SnarkJS, an independent implementation of the zk-SNARKs protocol [21] written in JavaScript and thus browser compatible. Zero-Knowledge-Succinct Non-Interactive Arguments of Knowledge (zkSNARK) are “succinct” zero-knowledge proofs that can be verified in a few milliseconds, with a proof length of only a few hundred bytes even for statements about very large programs (https://github.com/iden3/snarkjs, accessed on 23 October 2023). In addition to being fast and directly executable from a browser, zkSnarks proofs allow for the verification of a proof without gaining knowledge of the solution, and they do not require interactions between the prover and the verifier.

3.3. Business Logic

In the following subsections, we zoom in on the specific interactions between the C-Box® inner services and external platforms implemented to achieve our goals.

3.3.1. Notarization Process

Figure 4 illustrates the process of notarization triggered whenever an issuer wants to deliver a badge to a learner.
  • From the Web Application, the issuer releases a badge (1), and the application makes an HTTP call to the Web API component to perform authorization (does the user have the right to access this feature?) and validation (can the learner for whom the badge is to be issued receive this badge from this issuer?, etc.) checks (2).
  • Then, the Web API component instantiates the services necessary for the release (3): specifically, the Assertion Service creates the badge image and saves it in blob storage and creates the necessary database records for the description and Open Badge standards, any files attached to the certification are saved, and a notification email is sent to the learner (3–5).
  • Following these procedures, the Assertion Service queries the Blockchain Service (6) that will take care of the notarization.
  • This amounts first of all to the creation of the JSON that represents the certification. For this, required data are retrieved from the database (7) and from the blob repository (8). This JSON contains the descriptive information of the certification, and the hash of each attachment is made and added to the JSON.
  • Then, the hash of this JSON is calculated (9) and added as an input parameter to the transaction executing the notarization. This transaction is a function of the smart contract (called Notarize), which uniquely associates the assertion identifier with the obtained hash string.
  • Through the Alchemy RPC service, the gas cost required to mint the transaction is estimated (this value is indeed variable because it depends on the state of the Polygon network). The Blockchain service signs the transaction with the private key of the smart contract owner and sends the transaction again through the Alchemy RPC endpoint (10).
  • Mind that the time required for the transaction to be mined is variable (and also depends on the amount of gas associated with the transaction). To avoid blocking the user in a process that could also take minutes, the Blockchain Service sends the transaction without worrying about its actual mining (12). Instead, the transaction hash (which uniquely identifies it) is saved to the local database with a “pending” status (11).
  • Asynchronously, Alchemy queues the transaction to its own transaction mempool (13). If for any reason the transaction should be rejected by the network (dropped), a specific webhook is used to notify the C-Box® Web API component, which will take care of retrying the transaction.
  • If instead the transaction is mined (14), Alchemy’s webhook service will make an API call to C-Box® containing the transaction hash, the actual gas used, the gas cost, and the block number (15).
  • This information is saved in the C-Box® application’s cloud database by the Blockchain Service (16, 17).
  • Finally, through a websocket connection, if the issuer is still connected to C-Box®, he/she will be informed of the successful notarization of the assertion in the blockchain.
Figure 5 describes the process of verifying the integrity of a C-Box digital badge after notarization.
  • The verification carried out through a notarization check can be performed by any user (Verifier) by consulting the dedicated verification section on the C-Box portal (1).
  • The C-Box Web application queries the API application, which through the Assertion service retrieves from the database all the data necessary for verification and page display (2, 3), such as the smart contract address or the assertion’s identification code.
  • The Verifier user can then use a Polygon block explorer or directly use the verification page to interact with the getAssertionUri function of the Notarization Smart Contract (4).
  • Based on the assertion’s identification code, the smart contract returns a URI from which it is possible to retrieve the JSON that describes the digital certificate (5).
  • This URI points to the C-Box Web API application (6). The API can create the JSON through the blockchain service (7), which, by retrieving the details, images, and attachments of the assertion (8, 9), returns the certificate’s JSON (10).
  • The Verifier user can now evaluate the hash of this JSON using SHA256 through the verification page or any online hash tool (11). By accessing the GetAssertionHash function (12), the Verifier accesses the original blockchain hash string generated at the time of the assertion’s release (13).
  • By comparing the two obtained hashes, the absence of data modification representing the certificate can be verified (14), since even a small change would imply a completely different hash string.

3.3.2. Developed Smart Contract

For C-Box®, a smart contract has been developed with the precise task of carrying out the notarization and verification process on a public blockchain and at the same time guaranteeing the confidentiality of the information contained therein. A challenge has been to develop source code that is computationally the least-complex as possible to allow the lowest consumption of fees (hence monetary cost) during the notarization transaction.
The main phases of notarization carried out by the smart contract are summarized below (in reference to Figure 4):
  • The C-Box® application receives a notarization request for the assertion ID, e.g., 3616 (6).
  • The C-Box® blockchain service retrieves information from the database (7) and the blob repository (8) in order to create the JSON representing the assertion with ID 3616 (Listing 1).
  • The SHA256 algorithm is executed to get the hash string corresponding to the assertion data, e.g., 1F0D4095...DCB1CA50 (9).
  • The C-Box® application authenticates itself via private key to the Polygon network (10).
  • A signed transaction sent through Alchemy (12) can proceed to the notarization method of the smart contract, providing the assertion ID and the newly computed hash string (Figure 6).
  • In the smart contract, a record with the assertion identifier and its hash string as a value has been added to a mapping (13). A smart contract event confirms that the procedure has been completed (Figure 7).
  • The miner who mined the transaction generates and sends on the blockchain network the transaction receipt. Alchemy intercepts it (14), proving that the transaction has been mined. Alchemy forwards that receipt via webhook to the C-Box API app (15).
Listing 1. JSON of the badge to be notified.
Futureinternet 15 00350 i001
Every writing action on a public blockchain must be paid for via cryptocurrency. The gas fee is a fee paid for the use of the network and its nodes. The gas fee is paid in cryptocurrency, such as Eth (for the Ethereum blockchain) or Matic (for the Polygon blockchain), and its value can vary depending on supply and demand on the network as well as on the complexity of the transaction itself. The gas fee is a fee paid by users on the blockchain network to ensure the efficiency and security of the system. Since network nodes are managed by volunteer users (miners), the gas fee provides an incentive to motivate users to contribute their computing power to the network. By paying this fee, users can ensure priority in verifying and recording their transactions. The gas fee contributes to the efficiency of the network, avoiding abuses and congestion, and ensures a fair allocation of resources. It is important to keep in mind that the gas fee is only required for write operations (transactions) and never for reading.

3.3.3. Creation and Verification Workflows

Figure 8 shows the process by which an Issuer can issue Verifiable Credentials with the C-Box application.
  • The Issuer user issues a digital badge to multiple users from the dedicated page of the platform (1) in the case of a human user issuing the badge manually, or by using the C-Box® API services in the case of a third-party application integrated with C-Box®.
  • Following the usual authentication and validation checks (2), the Assertion Service handles all release procedures (3), including the creation and saving of images in the blob repository (4) and saving the related data in the database (5).
  • The Verifiable Credentials release procedure is carried out by the Blockchain Service (6): that is, the C-Box® module provides access to all the functions belonging to the blockchain, such as the smart contract, which first retrieves the DID files of the learners (7) saved in the Database.
  • Now, the Blockchain Service can query the relevant issuer node and create the VC through the CreateClaim API, specifying the learner’s DID, the reference scheme, and the information related to the certification to be issued (8).
  • The Issuer node adds this information to its storage system (9).
  • Once the claims have been added for all learners, the Blockchain Service takes care of saving the addition of the new claims in the blockchain (10).
  • “Publish Identity State” is an API of the Issuer node that retrieves the current state of the database in which the clear information has been saved. Using an algorithm that employs merkle tree roots, the storage system obtains a string describing the current state of the issuer node’s storage system. This string is saved on a dedicated smart contract (11–13) specifying the previous and current states of the issuer node. This asynchronous blockchain publishing procedure minimizes the number of transactions made on Polygon, thus avoiding excessive and unnecessary gas consumption in Polygon.
Figure 9 describes the process by which a verifier can request a user (holder) to prove possession of a particular certification.
Before our re-engineering effort, in C-Box®, the verification of the validity of a competence was carried out through the consultation of badges that attest to the competencies held by the badge holder whose skills one wants to verify. Polygon Id changes this process: verifiers can set up queries based on claims mapped by Open Badges issued by a set of issuers. The query encapsulates the criteria that a user must meet in order to meet the requirements of the verifier and can include multiple requirements. As shown in Figure 10, the verifier request is encapsulated in a QR code (generate zk request) and is shown to the user. The user scans the QR code with his/her wallet application to generate a ZKP. Note that the verification process does not involve any interaction between the verifier and the issuer that issued the claim but is a simple query to the verifiable data registry (Polygon) that verifies that the verifiable credentials that certify compliance with the required criteria are valid and not revoked. The Verifier thus obtains cryptographic proof that the user fulfils the requests without the user having to share additional information beyond that requested.
Back to Figure 9, a verifier user can decide to set up a check based on verifiable credentials using either an SDK provided by Polygon Id or directly from the C-Box portal.
  • The verifier first chooses the type of credential to check, creating the request based on a specific credential schema. He then advance a “VC verification request” to the web application (1).
  • The blockchain service translates the request into a query and generates a URI (2) from which a QR code is produced (3) and displayed on the screen (4).
  • The holder scans the QR code (5). Upon scanning, the Wallet analyses the query generated by the Verifier.
  • The Wallet makes a call to the issuer node to ensure the certification has not been revoked (6–7).
  • After successfully completing the authentication (a pin or biometric data), the Wallet initiates the process of generating a zero-knowledge proof to present to the Verifier (8).
  • The circuit sends its response to the Verifier via the callbackUrl specified in the QR Code (9).
  • After the proof has been sent to the Verifier, it analyses this proof to verify its authenticity and, based on its analysis, validates the proof (10).
  • The Verifier finally checks that the Issuer’s credential status and the User’s status are still valid (8–14) and have not been revoked.
  • If the verification is successful, the Verifier grants access to the user or activates any custom logics (15).
Notice how the user is able to demonstrate that he/she possesses his/her credentials (the competency digitally represented by the Open Badge) by providing only the requested information. He/she does not have to provide his/her first name, surname, email, or other information out of the context examined by the verifier (the employer). All is in full compliance with the ZKP paradigm. The user also explicitly choses what information to provide to the verifier and does not have to request any resources from the issuer or submit any request, which is in full fulfilment of identity verification in the context of SSI.
Finally, Figure 11 describes the process by which the holder can redeem his/her verifiable credentials on his/her wallet.
  • Upon accessing the private area of the user who received the credential, the holder requests the QR code for importing the credential (1) into his/her wallet.
  • Following authentication and validation checks (2), the web application forwards the request to the application.
  • The Blockchain service then traces back to the issuer who issued the certification and, by querying the relevant issuer node, retrieves the correct QR code (4).
  • The code is returned to the application (5) and is displayed on the screen.
  • The holder can now open his/her C-Box Verifiable Credentials wallet application installed on his/her device and scan the QR Code (6).
  • The app extracts from the QR Code and performs authentication checks via biometrics or a pin code (7).
  • The wallet can now make the call to the issuer node (8).
  • The node first checks the status of the credential, ensuring that it has not been revoked (9), then retrieves the information related to the credential in the storage system (10).
  • Finally, the status of the latter is evaluated (11) and compared with the status published on the blockchain (12–13), thus validating the integrity of the issuer node.
  • The wallet application can then finally save the credential within its storage system (10).

3.3.4. NFTs as Incentives

NFTs provide a unique solution for digitizing and authenticating objects or competencies in the virtual world [12] that, when applied to Open Badges, bring a number of advantages:
  • The possibility to unequivocally verify the ownership of a badge;
  • The ability to be transferred between wallets, thus offering the possibility to move a badge to different wallets;
  • The ability to be imported and exchanged on different platforms, offering wide interoperability and portability;
  • The ability to be easily transported and recognized on any platform that supports NFT standards. This means that an individual can “carry” his Open Badge with him all over the web, demonstrating his competencies or achievements wherever he goes. In addition, NFT portability can help reduce reliance on a single vendor or platform, giving individuals greater autonomy and control over their data and accomplishments.
However, there are also some potential disadvantages to consider. Since NFTs are public and traceable on the blockchain, if an Open Badge contains personal information, a privacy issue may arise. As mentioned earlier, using NFTs to manage personal data can present compliance issues with the General Data Protection Regulation (GDPR). However, to ensure the immutability of the content of an NFT, it is necessary that it points to an independent and immutable resource. In fact, the content of the Open Badge does not reside in the blockchain but in the server that makes it available at a given URL. Hence NFTs can be saved to an IPFS (InterPlanetary File System) (https://ipfs.tech/, accessed on 23 October 2023), which is a distributed, decentralized network used for permanent storage. An IPFS allows any user participating in its peer-to-peer network to save information persistently on all its component nodes. However, it is impossible by design to remove such information with certainty once it has been uploaded. If this approach were followed, the owner of the Open Badge would not have the ability to make the badge private, since an IPFS does not support this feature.
Thus, to obtain the aforementioned advantages of NFTs while solving this problem, we designed the NFTs of the C-Box® platform to point to an HTTPS resource in the C-Box® domain. Even if the content of the NFT can no longer take advantage of the immutability guaranteed by an IPFS in this way, (i) it becomes possible for the user, if he/she wishes, to make the information contained in the NFT private or to restrict access to it through an authentication process, and (ii) immutability is nevertheless preserved thanks to integrating a reference to the notarization verification portal into the NFT information. This system, implemented on C-Box®, blends NFT technology with privacy and confidentiality requirements, offering an effective and efficient solution to the challenges posed by the interaction between blockchain and personal data protection.
Finally, it is important to underline the fact that the creation of an NFT for each individual assertion on the C-Box® platform takes place only at the explicit request of the user. This process requires the user to connect his/her blockchain wallet to his/her C-Box® profile. This choice respects the user’s right to have active and conscious control over the creation and management of his/her information.
Of course, an NFT representing an Open Badge does not directly represent the competence, but it provides digital proof of its acquisition. Whoever buys the NFT does not become the subject of the competence but the owner of the certificate attesting to that competence. The application of NFTs to Open Badges thus introduces an element of collectability that can open up new business opportunities for issuers. This can stimulate learners to acquire a variety of Open Badges, increasing their professional training and, consequently, the offer of courses by issuers. NFTs on Open Badges have a potentially much wider value, as they can be used to create a market of competencies and experience. In this way, ownership of an NFT could become a status sign, indicating that an individual has acquired an asset describing a high-value competence.
In Figure 12, the process of a user (learner) wanting to redeem the NFT of the badge previously assigned to him/her is described.
  • The Web Application searches for the Metamask extension on the user’s browser. If it is not installed, the user is prompted to install it, and the application provides the necessary instructions. The user is prompted to connect his/her wallet to the C-Box site (1). This allows the web page to read the user’s public key via JavaScript. If necessary, the user is prompted to switch the Metamask network to Polygon Mainnet.
  • The webpage can now make a call to the C-Box web application (2) containing the assertion’s identifier and the user’s public key.
  • The call is then forwarded to the Web API component (3), which checks authentication and validation requirements (i.e., that the logged-in user owns the assertion and that an NFT has not already been redeemed for that assertion).
  • The Blockchain service then estimates the gas required for the minting operation and makes the transaction via Alchemy’s RPC (4–7).
  • Similarly to the notarization process, the transaction status is asynchronously updated via webhook (9–12).
  • The transaction invokes the “safeMint” method (8) of the smart contract related to the NFT collection under the jurisdiction of this specific issuer. The function passes parameters such as the newly created unique identifier of the assertion and the address of the learner’s wallet to which the NFT should be sent.
  • The Metamask wallet can now recognize the newly minted token now in the user’s possession (13). From now on, the user can conveniently access the NFT from the “NFT” section of Metamask.
Third-party applications that host NFTs–OpenSea (https://opensea.io/, accessed on 23 October 2023), for instance—can now query the smart contract and retrieve the URL to access specific metadata (description of the NFT, any attributes, and the image), as depicted in Figure 13.
  • By connecting the wallet (1), the hosting webpage can use Metamask to read the user’s address and query the NFT smart contracts that have interacted with it.
  • The page can then retrieve the NFT Identifiers that identify the tokens owned by the user (2).
  • To display the description and image of each individual NFT, the hosting platform retrieves the “NFT token URI” by querying the smart contract with the NFT Identifiers (3).
  • The NFT token URI is indeed the address where a JSON containing the NFT’s descriptive metadata can be found. These metadata are exposed through a specific API call provided by the C-Box API application (4–8). To protect privacy, such metadata can be obscured by the user through the C-Box platform at any time.

3.3.5. Support for Printed Badges

Issuer organizations often need to provide their learners with a physical version of the open badge, but ensuring the authenticity of these paper versions is a challenge. The goal is to provide a tool that can verify the authenticity of a physical document in a fast and user-friendly way. For this purpose, C-Box® provides QR codes on the printable version of the attestation (Figure 14).
Upon scanning the QR code, the user is redirected to the blockchain verification page (Figure 15). On this page, the user can access the digital and immutable version of the assertion and can directly access the details saved on the blockchain and the notarized JSON (Figure 16). Confidentiality requirements are respected since the digital version and metadata are only shown if the open badge has been made public either by the learner or by the issuer. In the case of a private badge, access to online information will be allowed only against a login procedure by a user with specific authorization policies.

4. Discussion

C-Box® enhances a company’s internal competency management system in several ways. First, the verifiable and reliable nature of the information contained in VCs simplifies the process of verifying employee competencies. This means that employees can quickly and easily provide information about their training and qualifications without having to perform manual checks or checks by the company’s HR. Second, C-Box® provides employees with more control and autonomy over their digital identities. This means that employees can decide to share only relevant information about their competencies and qualifications, protecting their privacy and ensuring that personal information is only used for legitimate purposes. In addition, C-Box® simplifies the sharing of competency and qualification information among employees, improving collaboration and productivity within the company. This is especially useful for large companies with multiple locations, as it allows employees to quickly and easily share their competencies and qualifications with their peers around the world. Finally, C-Box® streamlines the onboarding of new employees, allowing them to easily share information about their competencies and qualifications with the company. This can speed up the process of integrating new employees into the organization, ensuring that they are quickly assigned to appropriate positions based on their competencies and qualifications.
Imagine a healthcare professional named Laura. She owns a number of VCs that attest to her various competencies, training, and certifications in the field of medicine. Now suppose Laura wants to apply for a position in a hospital that specifically requires expertise in cardiology. In this case, Laura has a VC attesting to her specialization in cardiology. Suppose that throughout her career, Laura has also acquired competencies and certifications in other medical areas, such as psychiatry and orthopaedics. These other competencies, while valid and important, are not directly relevant to the specific position Laura is currently applying to. In addition, it may be in Laura’s best interest not to immediately share the full spectrum of her competencies for various reasons, including the possibility of appearing overqualified or wanting to focus on the most-relevant competencies. In this context, Laura can exploit the benefits of ZKP to demonstrate to the hospital that she has the cardiology specializatio, without revealing the other competencies or qualifications present in her VC. With the use of the ZKP, Laura can provide cryptographic proof that confirms the validity of her specialization in cardiology while keeping other competencies or certifications private. This way, the hospital can verify the required competence without having to access additional information about Laura’s other competencies.
From the point of view of the verifier, C-Box® provides a competency verification system that allows the control of multiple competencies in a rapid and certified way: continuing the previous example, the hospital will be able to create a QR code that, once scanned, starts a query to verify the specific competencies required for the role of a cardiologist. Using her smartphone, Laura can scan the QR code, which automatically launches her digital wallet app (her User Agent). At this point, Laura’s User Agent will search her VCs for proof of attestation in cardiology. Once the corresponding VC is found, C-Box® will create a Verifiable Presentation, which includes the ZKP. The latter allows Laura to demonstrate that she has the required competence without having to disclose the other competencies or qualifications. Laura’s digital wallet will then send the Verifiable Presentation to the hospital for verification. The hospital can then verify the authenticity of the presentation, checking if the entity that issued the credential is a reliable source and that the presentation has not been altered or falsified. In addition, the hospital can verify that the VC meets the criteria specified in the original query initiated through the QR code. If everything is successfully verified, the hospital can then confirm that Laura does indeed possess the cardiology specialization required for the position. This example illustrates how the use of ZKP for VCs enables assessment of competencies that respects the individual’s privacy, allowing selective sharing of information without compromising the confidentiality of other competencies or qualifications. The use of ZKP in this context balances the need to demonstrate the required competencies and the privacy of the individual, ensuring that only relevant information is shared without compromising the confidentiality of other personal information.
C-Box® also has some limitations and open issues that provide starting points for future improvement.
For instance, the choice of re-engineering the platform on top of a public blockchain provides the benefits of wider adoption, maximum transparency, and full decentralised control (as already discussed). However, it also poses some open issues that we are currently dealing with and which will be the subject of further work: mostly, its dependency on a native cryptocurrency for both transactions and smart contract execution. Every operation registered on the blockchain will spend some blockchain cryptocurrency to be carried out (even if in the slightest amount). Ensuring that all of the stakeholders have the right incentive to still adopt C-Box® as a remunerative investment must be a priority. Notice, remuneration need not be monetary or financial: certificate holders (e.g., students), for instance, have incentives to adopt the platform to preserve and exploit their curriculum and careers despite any monetary return.
Execution of smart contracts brings us to other potential issues and limitations: First, as already said, smart contracts also spend money to execute; hence, such expenditures must be predictable and sufficiently low so as not to scare users away. Second, smart contracts are immutable and thus must be carefully and extensively tested before deployment, as it is yet unclear and not standardised how to “deactivate” or remove a deployed smart contract or the implications of this. Related to the monetary cost of smart contracts’ execution is the need to carefully optimize the smart contract’s source code to limit expenditures as much as possible. In C-Box®, the smart contract devoted to notarization has been carefully designed, implemented, and then optimised to keep transaction fees at the lowest and to devise upper bounds on related expenditures. A rigorous description of the process and analysis of computational performance as well as average costs is the subject of ongoing work and will be published separately.
Another open issue is a precise evaluation of the role of NFTs as complementary incentives to Open Badges. Our hope is that NFTs stimulate and incentivize people to acquire skills and competencies to showcase on, e.g., social platforms, but also to potentially gain monetary and financial value from them—as exemplified in Section 2.3.2. In perspective, a whole market can grow out of NFT exchange targeted at collectors of others’ certificates.
Finally, we have identified another open issue related to evaluation regarding the whole C-Box® platform. A rigorous assessment of C-Box®’s performance and adoption is needed to confirm its strengths and uncover potential issues. Such an endeavour is currently underway.

5. Related Works

In [22], blockchain applications for HRM and other fields are thoroughly surveyed and commented. Out of the 12 papers collected that specifically targeted HRM, only 1 proposes a prototype blockchain-based platform: all others are conceptual studies. That one, however, proposes blockchain as a way to achieve consensus about the skills needed by a consortium of stakeholders; hence, it is much more narrow in scope compared to our proposal [23].
In [24], the QualiChain European project is presented in its initial conception and early development. Other subsequent publications mention the project, but it is unclear to us what final resulting platform it produced (e.g., whether it fulfils all the initial desiderata) and the extent of its adoption. Further, QualiChain is conceived as a comprehensive suite of APIs for the three main stakeholders of blockchain-based competency management: those who acquire them (e.g., students and employees), those who produce them (e.g., schools, training institutions, and work companies), and those who want to validate them (e.g., employers). Thus, QualiChain offers services such as profiling and recruiting that C-Box® does not offer out of the box—although it is posible to develop them on top of currently available C-Box® APIs. As such, QualiChain is surely more comprehensive than C-Box®—at least in theory. However, two peculiarities of C-Box® even when compared to such a comprehensive platform are: usage of NFTs linked to Open Badges to nurture adoption and widen participation, and supporting VCs in full compliance with the SSI paradigm and technological requirements—this latter aspect, in particular, is unclear in QualiChain.
In [25], a badge-awarding system for performance assessment in education is proposed, integrating a platform for badge awarding (compliant with the Open Badges 2.0 specification) and a blockchain for tamper-proof tracking and verification. The proposed system relies on the Badgr platform for Open Badge issuing while either Bitcoin or Ethereum can be used for badge-related event tracking and verification. Although this work is similar to ours in the goal pursued (integrate blockchain into competency management systems for better security and transparency while maintaining decentralisation of control), we exploit blockchain also for distributed verification (through the developed smart contract) rather than for event tracking only. Also, we incorporate NFTs in the picture and more comprehensively support the paradigm of SSI. Also in [26], the Badgr platform is taken as a reference for integration of blockchains, although the developed solution is explicitly a proof-of-concept (featuring a simple custom blockchain implementation) and is more concerned with integration with a MOOC platform than with SSI and badge sharing.
In [27,28], the authors integrate Blockcerts and Ethereum to provide decentralised governance to Open Badges issuers: smart contracts are provided to manage creation and execution of certification consortia and to deal with certificate issuing and verification. Decentralised governance is the focus of the proposed ecosystem, which essentially provides the means to create a decentralised autonomous organisation on a public blockchain. This work is very similar to ours, although we worked with an existing commercial product (C-Box®). The main differences are that we (i) also take care of decentralised credential management by offering a solution based on Polygon IDs, (ii) also provide NFTs as an added incentive to attract users, and (iii) stay open to any Open Badge certification platform, not only Blockcert. Nevertheless, the experimental evaluation carried out in this related work may serve as inspiration for a comparison to be carried out as future work. Also the work in [29] integrates Blockcerts and Bitcoin, although not many details are provided about the smart contracts developed and the processes of certification issue, redemption, and validation.
In [30], another blockchain-based certificate management platform is presented; however, the focus is on students’ acquisition and social sharing of certificates, not on SSI and generic competency tracking. Interestingly, though, the authors carry out a performance assessment comparing a private blockchain implementation (HyperLedger Fabric) with a public one (Ethereum), that we plan to undertake as a next step in our research.
In [31], the authors propose their own blockchain implementation for storing digital certificates, which has the drawback of needing to attract users in the first place and competing with already globally established public blockchains.
In [32], another blockchain-based system for competency management is proposed, although it is more focused on solving staff scheduling problems for an organisation than on providing a general-purpose competency management platform open to any typical stakeholder (issuers, validators, and holders). Also, it uses a consortium blockchain; hence, participation is inherently closed to elected members, and it does not rely on open standards for the digital representation of competencies (such as Open Badges). It is thus quite different from the C-Box® platform here presented.
In [33], an NFT-based solution for digital certificate issuing, tracking, and verification is proposed. The Ethereum blockchain together with its smart contracts is used by issuers to craft NFTs representing digital certificates of whatever sort (e.g., students’ attestations or worker competencies) by users to acquire NFTs and by others to verify ownership of the NFTs (hence of the certificate). Such a solution shares our objective but does not make use of the Open Badges standard, which is a much more reasonable choice for representing digital certificates, nor does it fully comply with the SSI principles.
In [34], applications of NFT technology to the education sector (and others, to a lesser extent) are surveyed. Among the many applications, management of micro-certificates (i.e., certificates of any sort attesting to even a single lesson attended), learning experiences, student records, and general data collection are also considered. There, NFTs are used essentially in place of Open Badges to digitally represent the achievement of a student: a practice we already commented on as being suboptimal.
In summary, there are many recent attempts to re-engineer (generally speaking) “competency management” systems, especially in education [35], to take advantage of blockchain security, transparency, and decentralisation, or NFTs’ capability to represent ownership. This witnesses the rising interest in the topic we deal with in this paper. However, ours is the first proposal not only adopting blockchain to ease the process of certification validation but also comprehensively taking into account SSI as a cornerstone of competency management, empowering certification recipients to exert full control over their data. Additionally, we also include NFT incentives into the picture as a means to incentivise adoption.

6. Conclusions

In this paper, we proposed C-Box®, a blockchain-based platform for competency management using Open Badges in full compliance with Self-Sovereign Identity (SSI) principles. With C-Box®, badge recipients, issuer organisations, and verifiers can carry out their goals independently while resting assured that the competencies digitalised as Open Badges, as well as their whole handling process from generation to redeeming, are authentic, correctly attributed by the responsible organisation to the right person, and uncompromised. Part of these desired properties come from the blockchain, which enables implementation of custom smart contracts for the notarization of the whole Open Badge lifecycle. But another part derives from our efforts to design and implement a solution fully compliant with the SSI paradigm: we realised the mechanisms to fully exploit verifiable presentations by using decentralised identifiers and zero-knowledge proof. This puts the user fully in control of his/her own data. Finally, we added to C-Box® the opportunity to release NFTs attached to Open Badges as a form of incentive for participation and also as an opportunity for monetization.
Future directions for the Open Badge and Web 3.0 technology sector require a thorough and methodical examination of the results obtained so far in order to fully understand the impact and potential of these tools. This not only helps to understand the real value and effectiveness of existing solutions but also offers the possibility to identify strengths, areas for improvement, and opportunities for innovation. A key aspect to consider is the analysis of computational performance. With the increasing use of blockchain technology and Web 3.0 applications, it is essential to examine their impact on system performance, both in terms of speed and efficiency. This could include analysing the efficiency of notarization in blockchain, transaction speed, resource management, and energy use.

Author Contributions

Conceptualization, G.A. and S.V.; methodology, A.F. and S.M.; software, A.F.; writing—original draft preparation, A.F. and S.M.; writing—review and editing, S.M., G.A., S.V. and F.Z.; visualization, A.F.; supervision, G.A., S.V. and F.Z. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

No data has been used or produced in the context of this contribution.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
HRHuman Resources
SSISelf-Sovereign Identity
IQCItalian Quality Company
NFTNon-Fungible Token
VCVerifiable Credential
DIDDecentralized IDentifiers
ZKPZero-Knowledge Proof

References

  1. Yi, C.S.S.; Yung, E.; Fong, C.; Tripathi, S. Benefits and Use of Blockchain Technology to Human Resources Management: A Critical Review. Int. J. Hum. Resour. Stud. 2020, 10, 131. [Google Scholar] [CrossRef]
  2. Mishra, H.; Venkatesan, M. Blockchain in human resource management of organizations: An empirical assessment to gauge HR and non-HR perspective. J. Organ. Chang. Manag. 2021, 34, 525–542. [Google Scholar] [CrossRef]
  3. Clements, K.; West, R.E.; Hunsaker, E. Getting Started with Open Badges and Open Microcredentials. Int. Rev. Res. Open Distrib. Learn. 2020, 21, 154–172. [Google Scholar] [CrossRef]
  4. Lockley, A.; Derryberry, A.; West, D. Drivers, Affordances and Challenges of Digital Badges. In Foundation of Digital Badges and Micro-Credentials: Demonstrating and Recognizing Knowledge and Competencies; Ifenthaler, D., Bellin-Mularski, N., Mah, D.K., Eds.; Springer International Publishing: Cham, Switzerland, 2016; pp. 55–70. [Google Scholar] [CrossRef]
  5. Casper, S.; Whitley, R. Managing competences in entrepreneurial technology firms: A comparative institutional analysis of Germany, Sweden and the UK. Res. Policy 2004, 33, 89–106. [Google Scholar] [CrossRef]
  6. Draganidis, F.; Mentzas, G. Competency based management: A review of systems and approaches. Inf. Manag. Comput. Secur. 2006, 14, 51–64. [Google Scholar] [CrossRef]
  7. Veluvali, P.; Surisetti, J. Learning Management System for Greater Learner Engagement in Higher Education—A Review. High. Educ. Future 2022, 9, 107–121. [Google Scholar] [CrossRef]
  8. Abdelrahman, G.; Wang, Q.; Nunes, B. Knowledge Tracing: A Survey. ACM Comput. Surv. 2023, 55, 1–37. [Google Scholar] [CrossRef]
  9. Radziwill, N. Blockchain Revolution: How the Technology behind Bitcoin is Changing Money, Business, and the World. Qual. Manag. J. 2018, 25, 64–65. [Google Scholar] [CrossRef]
  10. Giannopoulou, A.; Wang, F. Self-sovereign identity. Internet Policy Rev. 2021, 10, 1–10. [Google Scholar] [CrossRef]
  11. Cucko, S.; Turkanovic, M. Decentralized and Self-Sovereign Identity: Systematic Mapping Study. IEEE Access 2021, 9, 139009–139027. [Google Scholar] [CrossRef]
  12. Hammi, B.; Zeadally, S.; Perez, A.J. Non-Fungible Tokens: A Review. IEEE Internet Things Mag. 2023, 6, 46–50. [Google Scholar] [CrossRef]
  13. Cuel, R.; Virili, F.; Ghiringhelli, C.; Bolici, F. An Emerging Digital Ecosystem: Blockchain Competence Certification Networks. In Proceedings of the Exploring Innovation in a Digital World; Ceci, F., Prencipe, A., Spagnoletti, P., Eds.; Springer International Publishing: Cham, Switzerland, 2021; pp. 50–61. [Google Scholar]
  14. Mühle, A.; Grüner, A.; Gayvoronskaya, T.; Meinel, C. A survey on essential components of a self-sovereign identity. Comput. Sci. Rev. 2018, 30, 80–86. [Google Scholar] [CrossRef]
  15. Sedlmeir, J.; Smethurst, R.; Rieger, A.; Fridgen, G. Digital Identities and Verifiable Credentials. Bus. Inf. Syst. Eng. 2021, 63, 603–613. [Google Scholar] [CrossRef]
  16. Fiege, U.; Fiat, A.; Shamir, A. Zero Knowledge Proofs of Identity. In Proceedings of the Nineteenth Annual ACM Symposium on Theory of Computing (STOC’87), New York, NY, USA, 25–27 May 1987; Association for Computing Machinery: New York, NY, USA, 1987; pp. 210–217. [Google Scholar] [CrossRef]
  17. Lim, S.; Rhie, M.H.; Hwang, D.; Kim, K.H. A Subject-Centric Credential Management Method based on the Verifiable Credentials. In Proceedings of the 2021 International Conference on Information Networking (ICOIN), Jeju Island, Republic of Korea, 13–16 January 2021; pp. 508–510. [Google Scholar] [CrossRef]
  18. Crosby, M.; Pattanayak, P.; Verma, S.; Kalyanaraman, V. Blockchain technology: Beyond bitcoin. Appl. Innov. 2016, 2, 71. [Google Scholar]
  19. Casino, F.; Dasaklis, T.K.; Patsakis, C. A systematic literature review of blockchain-based applications: Current status, classification and open issues. Telemat. Inform. 2019, 36, 55–81. [Google Scholar] [CrossRef]
  20. Guidi, B.; Michienzi, A. From NFT 1.0 to NFT 2.0: A Review of the Evolution of Non-Fungible Tokens. Future Internet 2023, 15, 189. [Google Scholar] [CrossRef]
  21. Chen, T.; Lu, H.; Kunpittaya, T.; Luo, A. A Review of zk-SNARKs. arXiv 2022, arXiv:2202.06877. [Google Scholar]
  22. Ramachandran, R.; Babu, V.; Murugesan, V.P. The role of blockchain technology in the process of decision-making in human resource management: A review and future research agenda. Bus. Process. Manag. J. 2022, 29, 116–139. [Google Scholar] [CrossRef]
  23. Fachrunnisa, O.; Hussain, F.K. Blockchain-based human resource management practices for mitigating skills and competencies gap in workforce. Int. J. Eng. Bus. Manag. 2020, 12, 1847979020966400. [Google Scholar] [CrossRef]
  24. Kontzinos, C.; Kokkinakos, P.; Kapsalis, P.; Markaki, O.; Karakolis, V.; Psarras, J. Leveraging blockchain, analytics and decision support to facilitate qualifications’ verification, recruitment and competency management: The QualiChain project and initial results. Int. J. Adv. Intell. Syst. 2020, 3, 177–191. [Google Scholar]
  25. Choi, M.; Kiran, S.R.; Oh, S.C.; Kwon, O.Y. Blockchain-Based Badge Award with Existence Proof. Appl. Sci. 2019, 9, 2473. [Google Scholar] [CrossRef]
  26. Downes, S. Recognising Achievement with Badges and Blockchain in a Connectivist MOOC. J. Learn. Dev. 2019, 6, 273–286. [Google Scholar] [CrossRef]
  27. Serranito, D.; Vasconcelos, A.; Guerreiro, S.; Correia, M. Blockchain Ecosystem for Verifiable Qualifications. In Proceedings of the 2020 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS), Paris, France, 28–30 September 2020; pp. 192–199. [Google Scholar] [CrossRef]
  28. Mikroyannidis, A.; Third, A.; Chowdhury, N.; Bachler, M.; Domingue, J. Supporting Lifelong Learning with Smart Blockchain Badges. Int. J. Adv. Intell. Syst. 2020, 13, 163–176. [Google Scholar]
  29. Jeong, W.; Choi, M. Design of Recruitment Management Platform Using Digital Certificate on Blockchain. J. Inf. Process. Syst. 2019, 15, 707–716. [Google Scholar]
  30. Mainetti, L.; Paiano, R.; Pedone, M.; Quarta, M.; Dervishi, E. Digital Brick: Enhancing the Student Experience Using Blockchain, Open Badges and Recommendations. Educ. Sci. 2022, 12, 567. [Google Scholar] [CrossRef]
  31. Huynh, T.T.; Tru Huynh, T.; Pham, D.K.; Khoa Ngo, A. Issuing and Verifying Digital Certificates with Blockchain. In Proceedings of the 2018 International Conference on Advanced Technologies for Communications (ATC), Ho Chi Minh City, Vietnam, 18–20 October 2018; pp. 332–336. [Google Scholar] [CrossRef]
  32. Balon, B.; Kalinowski, K.; Paprocka, I. Application of Blockchain Technology in Production Scheduling and Management of Human Resources Competencies. Sensors 2022, 22, 2844. [Google Scholar] [CrossRef]
  33. Bayğın, N. Digital Assurance and Traceability of NFT-Based Certificates. Ileri Teknol. Çalı¸smalar Derg. 2023, 1, 17–25. [Google Scholar] [CrossRef]
  34. Wu, C.H.; Liu, C.Y. Educational Applications of Non-Fungible Token (NFT). Sustainability 2023, 15, 7. [Google Scholar] [CrossRef]
  35. Loukil, F.; Abed, M.; Boukadi, K. Blockchain adoption in education: A systematic literature review. Educ. Inf. Technol. 2021, 26, 5779–5797. [Google Scholar] [CrossRef]
Figure 1. Representation of an Open Badge as implemented in C-Box®: an image and metadata describing the achievement.
Figure 1. Representation of an Open Badge as implemented in C-Box®: an image and metadata describing the achievement.
Futureinternet 15 00350 g001
Figure 2. Three-party verification model.
Figure 2. Three-party verification model.
Futureinternet 15 00350 g002
Figure 3. C-Box® system architecture.
Figure 3. C-Box® system architecture.
Futureinternet 15 00350 g003
Figure 4. Notarization of an Open Badge released by an issuer organisation.
Figure 4. Notarization of an Open Badge released by an issuer organisation.
Futureinternet 15 00350 g004
Figure 5. Verification of an Open Badge and, hence, of its notarization.
Figure 5. Verification of an Open Badge and, hence, of its notarization.
Futureinternet 15 00350 g005
Figure 6. The notarization method.
Figure 6. The notarization method.
Futureinternet 15 00350 g006
Figure 7. Confirmation from the smart contract.
Figure 7. Confirmation from the smart contract.
Futureinternet 15 00350 g007
Figure 8. Creation of verifiable credentials in C-Box®.
Figure 8. Creation of verifiable credentials in C-Box®.
Futureinternet 15 00350 g008
Figure 9. Verification of verifiable credentials in C-Box®.
Figure 9. Verification of verifiable credentials in C-Box®.
Futureinternet 15 00350 g009
Figure 10. Polygon ID workflow.
Figure 10. Polygon ID workflow.
Futureinternet 15 00350 g010
Figure 11. Redeeming of verifiable credentials.
Figure 11. Redeeming of verifiable credentials.
Futureinternet 15 00350 g011
Figure 12. Redeeming of the NFT associated with an owned Open Badge.
Figure 12. Redeeming of the NFT associated with an owned Open Badge.
Futureinternet 15 00350 g012
Figure 13. NFT portability across hosting platforms.
Figure 13. NFT portability across hosting platforms.
Futureinternet 15 00350 g013
Figure 14. QR code provided for the paper attestation.
Figure 14. QR code provided for the paper attestation.
Futureinternet 15 00350 g014
Figure 15. Verification page.
Figure 15. Verification page.
Futureinternet 15 00350 g015
Figure 16. Notarized JSON.
Figure 16. Notarized JSON.
Futureinternet 15 00350 g016
Table 1. Main differences between NFTs and VCs.
Table 1. Main differences between NFTs and VCs.
NFTsVCs
What it isPublicly exposed
digital property right
Private digital fact
Requires blockchainYesBoth with and
without a blockchain
TransferableYesNo
ImmutabilityHistory of transactions
is always immutable;
content is only saved
in a distributed environment
Only if based on
an immutable, verifiable
data registry
ImplementationBlockchain and timestampsSymmetric key infrastructure
PurposeProves ownership
of an entity,
granting exclusive rights
to the owner
Proves identity
of an entity
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Francia, A.; Mariani, S.; Adduce, G.; Vecchiarelli, S.; Zambonelli, F. Digital Management of Competencies in Web 3.0: The C-Box® Approach. Future Internet 2023, 15, 350. https://doi.org/10.3390/fi15110350

AMA Style

Francia A, Mariani S, Adduce G, Vecchiarelli S, Zambonelli F. Digital Management of Competencies in Web 3.0: The C-Box® Approach. Future Internet. 2023; 15(11):350. https://doi.org/10.3390/fi15110350

Chicago/Turabian Style

Francia, Alberto, Stefano Mariani, Giuseppe Adduce, Sandro Vecchiarelli, and Franco Zambonelli. 2023. "Digital Management of Competencies in Web 3.0: The C-Box® Approach" Future Internet 15, no. 11: 350. https://doi.org/10.3390/fi15110350

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop