A Study on Improvement of the Military IdAM Using Edge-Sovereign Identity (ESI)

Authors

  • Gyudong Park Command and Control Systems PMO, Agency for Defense Development, Seoul, Korea
  • Gi-Yoon Jeon Command and Control Systems PMO, Agency for Defense Development, Seoul, Korea
  • Jong-Oh Kim Future Innovation Systems Co., Ltd, Daejeon, Korea

DOI:

https://doi.org/10.13052/jwe1540-9589.2153

Keywords:

Self-Sovereign Identity, IdAM, Edge-Sovereign Identity

Abstract

A framework-level IdAM integration approach requires a stable network infrastructure. Information framework’s operation may be significantly restricted when the network is disconnected from the remote IdAM service. Moreover, military networks, especially tactical networks, are volatile, and network disconnection is also high. In this paper, we proposed an Edge-Sovereign Identity (ESI) that expanded the concept of SSI for use in the military field, designed the structure and function of the proposed concept, and demonstrated its usefulness and validity through examples and prototypes.

Downloads

Download data is not yet available.

Author Biographies

Gyudong Park, Command and Control Systems PMO, Agency for Defense Development, Seoul, Korea

Gyudong Park received his Ph. D. degree in computer engineering from Hongik University, Korea, in 2014. He has been working in the Agency for Defense Development (ADD), Seoul, Korea as a researcher since 1998. And his research area includes command and control, interoperability, network, information exchange, and security.

Gi-Yoon Jeon, Command and Control Systems PMO, Agency for Defense Development, Seoul, Korea

Gi-Yoon Jeon received the MD in POSTECH in 2002 and Ph.D. in Dongguk University in 2021. From 2002 to now, he has been a researcher of Agency for Defense Development (ADD), Seoul, Korea. His research areas of interest are Computer Graphics, AI, IoT/IoB, Human-Robot Interaction.

Jong-Oh Kim, Future Innovation Systems Co., Ltd, Daejeon, Korea

Jong-Oh Kim received a bachelor’s degree from Kyungpook National University in 1990, a master’s degree in Electronics from Kyungpook National University in 1992, respectively. From 1992 to 1999, he served as a senior researcher at Electronics and Telecommunications Research Institute (ETRI) in Korea. He is currently working as a CEO at Future Innovation Systems Co., Daejeon. His research areas include Quantum Key Distribution, Data Acceleration, and Security.

References

Andrew Tobin, Drummond Reed, ‘The Inevitable Rise of Self-Sovereign Identity’, A white paper from the Sovrin Foundation, 2017

Alexander Mühle, Andreas Grüner, et al., ‘A Survey on Essential Components of a Self-Sovereign Identity’, 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS), pp. 97–101, 2020

Michael Kuperberg, ‘Blockchain-Based Identity Management: A Survey from the Enterprise and Ecosystem Perspective’, IEEE Transactions on Engineering Management, Vol. 67, No. 4, pp. 1008–1027, Nov. 2020

Korea Internet & Security Agency official website http://www.kisa.or.kr/201

Nguyen Binh Truong, Kai Sun, et al., ‘GDPR-Compliant Personal Data Management: A Blockchain-Based Solution’, IEEE Transactions on Information Forensics and Security, Vol. 15, pp. 1746–1761, 2020

Huansheng Ning, Zhong Zhen, et al., ‘A Survey of Identity Modeling and Identity Addressing in Internet of Things’, IEEE Journal of Internet of Things, Vol. 7, No. 6, pp. 4697–4710, 2020

Mohd Javaid, Abid Haleem, et al., ‘Internet of Behaviours (IoB) and its role in customer services’, Sensors International 2, 2021

Peter Haag and Marco Spruit, ‘Selecting and implementing Identity and Access Management technologies: The IAM Services Assessment Model’, Digital Identity and Access Management, pp. 348–365, 2011

Downloads

Published

2022-07-27

How to Cite

Park, G. ., Jeon, G.-Y. ., & Kim, J.-O. . (2022). A Study on Improvement of the Military IdAM Using Edge-Sovereign Identity (ESI). Journal of Web Engineering, 21(05), 1435–1448. https://doi.org/10.13052/jwe1540-9589.2153

Issue

Section

SPECIAL ISSUE: Intelligent Edge Computing