A Study on Improvement of the Military IdAM Using Edge-Sovereign Identity (ESI)
DOI:
https://doi.org/10.13052/jwe1540-9589.2153Keywords:
Self-Sovereign Identity, IdAM, Edge-Sovereign IdentityAbstract
A framework-level IdAM integration approach requires a stable network infrastructure. Information framework’s operation may be significantly restricted when the network is disconnected from the remote IdAM service. Moreover, military networks, especially tactical networks, are volatile, and network disconnection is also high. In this paper, we proposed an Edge-Sovereign Identity (ESI) that expanded the concept of SSI for use in the military field, designed the structure and function of the proposed concept, and demonstrated its usefulness and validity through examples and prototypes.
Downloads
References
Andrew Tobin, Drummond Reed, ‘The Inevitable Rise of Self-Sovereign Identity’, A white paper from the Sovrin Foundation, 2017
Alexander Mühle, Andreas Grüner, et al., ‘A Survey on Essential Components of a Self-Sovereign Identity’, 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS), pp. 97–101, 2020
Michael Kuperberg, ‘Blockchain-Based Identity Management: A Survey from the Enterprise and Ecosystem Perspective’, IEEE Transactions on Engineering Management, Vol. 67, No. 4, pp. 1008–1027, Nov. 2020
Korea Internet & Security Agency official website http://www.kisa.or.kr/201
Nguyen Binh Truong, Kai Sun, et al., ‘GDPR-Compliant Personal Data Management: A Blockchain-Based Solution’, IEEE Transactions on Information Forensics and Security, Vol. 15, pp. 1746–1761, 2020
Huansheng Ning, Zhong Zhen, et al., ‘A Survey of Identity Modeling and Identity Addressing in Internet of Things’, IEEE Journal of Internet of Things, Vol. 7, No. 6, pp. 4697–4710, 2020
Mohd Javaid, Abid Haleem, et al., ‘Internet of Behaviours (IoB) and its role in customer services’, Sensors International 2, 2021
Peter Haag and Marco Spruit, ‘Selecting and implementing Identity and Access Management technologies: The IAM Services Assessment Model’, Digital Identity and Access Management, pp. 348–365, 2011