
ISSN:1390-9266 e-ISSN:1390-9134 LAJC 2025 91
DOI:
LATIN-AMERICAN JOURNAL OF COMPUTING (LAJC), Vol XII, Issue 2, July 2025
https://doi.org/10.33333/lajc.vol12n2.08
G. Mandinyenya, and Vusimuzi Malele,
“A Blockchain-based Identity Management Solution for Secure Personal Data Sharing in Africa:
A Systematic Literature Review”,
Latin-American Journal of Computing (LAJC), vol. 12, no. 2, 2025.
2. Regulatory Fragmentation: Divergent national laws
(e.g., Kenya’s Data Protection Act vs. ECOWAS guidelines)
complicate cross-border identity frameworks.
3. Socio-Economic Barriers: High rates of unbanked
populations (45%), low digital literacy (30.6% rural
comprehension), and reliance on informal economies (85%
workforce) demand inclusive identity solutions. Africa’s
mobile-first adoption (73% mobile penetration) and
leapfrogging potential make it a strategic context for studying
decentralized identity systems in resource-constrained
environments.
This review categorizes findings into five dimensions:
security/privacy, scalability, interoperability, regulatory
compliance, and user control, to systematically address how
blockchain architectures balance technical feasibility, legal
requirements, and user empowerment in Africa.
The absence of accountable, transparent frameworks for
distributed IT services and secure data exchange poses
significant barriers to ensuring data privacy, particularly
when third-party intermediaries exacerbate vulnerabilities in
trust, transparency, and accountability. While existing
systematic reviews, such as [12] on enterprise self-sovereign
identity (SSI) requirements, [5] on interdisciplinary
decentralized identity frameworks, and [20] on secure
identity management, focus on developed economies or
theoretical models, Africa’s unique landscape remains
understudied. Characterized by infrastructural constraints
(e.g., 51.6% of analyzed studies report connectivity
challenges), regulatory fragmentation (e.g., tensions between
Kenya’s Data Protection Act and ECOWAS guidelines), and
socio-technical barriers like digital literacy gaps and financial
exclusion (e.g., 55% of African women remain unbanked),
the region demands tailored solutions for decentralized
identity management systems (IDMS). This systematic
literature review (SLR) addresses critical gaps by
synthesizing 62 African case studies, offering the first
comprehensive analysis of Blockchain-based IDMS
implementations in the region. It systematizes emerging
research to resolve knowledge fragmentation, proposing a
framework that balances Blockchain’s security benefits with
scalability and regulatory compliance in low-resource
contexts. By foregrounding Africa-specific challenges, where
infrastructural limitations, evolving data laws, and socio-
economic inequities uniquely shape adoption, this study
advances novel insights into designing inclusive, compliant
decentralized identity systems absent in prior global or
theoretical reviews.
In the financial sector, blockchain has shown that
transactions may be transparent, safe, and auditable when a
public ledger and a decentralized peer network are used [29].
Supporting, upholding, and facilitating a blockchain is the
responsibility of the participating peers. These players might
be many organizations that supply computer resources to
support a corporate blockchain application through a
permissioned consortium network, or they could be
anonymous individuals working together to give
computational capacity to support a public network [30].
Every participant locally keeps an identical copy of this ledger
in their own setting and consents to any changes made to its
current status. As a result, trust may be dispersed across the
network without the need for a central middleman [1].
II. BLOCKCHAIN TECHNOLOGY IN IDENTITY MANAGEMENT
A. Related Work
Prior reviews have laid foundational insights into
blockchain-based identity management. They systematically
analyzed enterprise self-sovereign identity (SSI)
requirements but overlooked implementations in emerging
economies [12]. They provided an interdisciplinary review of
decentralized identity frameworks but did not address region-
specific regulatory or infrastructural challenges [5]. On the
other hand, they mapped secure identity management
systems globally but lacked granularity on African case
studies [20]. Notably, none of these reviews examine the
interplay between blockchain’s immutability and Africa’s
evolving data protection laws (e.g., GDPR vs. Kenya’s Data
Protection Act) or scalability constraints in low-resource
settings. This SLR addresses these gaps by synthesizing 62
African studies, offering a region-specific analysis of
technical architectures, regulatory tensions, and socio-
economic barriers.
Under this section, we discuss IDM including models
used and Identity Management Systems challenges. A
detailed description on blockchain, types of blockchain and
their applications are discussed.
B. Identity Management
Having a digital identity is essential for people to interact
with service providers. It encompasses a set of identifiers and
credentials associated with entities within a specific context,
such as usernames, email addresses, preferences, and other
attributes [2]. Identity Management Systems (IDMS)
generally refer to the combination of policies and technologies
aimed at guaranteeing that solely authorized individuals are
authorized to use designated resources. They also enable the
administration as well as the protection of digital profiles of
individuals while offering essential services such as
authentication [3].
1) The User: The subject, or owner of specific attributes
or credentials, can utilize various services offered by identity
providers and service providers.
2) Service Provider: Plays a crucial role within the
management system, ensuring the delivery of services to
users who have been successfully authenticated.
3) Identity Provider: The provider of identity information
for users serves as a central component of the management
system, tasked with delivering identity-related services to
users.