TY - GEN
T1 - Evaluation Factors for Blockchain Identity Management Systems
AU - Alamri, Bandar
AU - Crowley, Katie
AU - Richardson, Ita
N1 - Publisher Copyright:
© The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2024.
PY - 2024
Y1 - 2024
N2 - Every system has specific functions to run appropriately to meet system requirements. Thus, Blockchain (BC) Identity Management (IdM) systems built for applications, such as Health Internet of Things (HIoT), should consider IdM technical aspects and HIoT application’s requirements, standardisation and regulations. BC is the foundation of BC-IdM systems, and thus it is at the core of this study. The evaluation factors are essential in determining the reliability and suitability of such systems, particularly in security systems designed to be security guards, such as IdM systems. In addition, cybersecurity risk management for such systems should evaluate the security, technical, application requirements, and organisational aspects to mitigate security risks and ensure functional systems. In this article, we conducted a literature review on BC-IdM systems and identified the components of the BC-IdM ecosystem and the evaluation factors for BC-based IdM systems. The evaluation factors are divided into four main criteria: security and privacy, technical, application, and external factors. Moreover, a case study of BC-IdM in HIoT systems is discussed to show the application evaluation factors.
AB - Every system has specific functions to run appropriately to meet system requirements. Thus, Blockchain (BC) Identity Management (IdM) systems built for applications, such as Health Internet of Things (HIoT), should consider IdM technical aspects and HIoT application’s requirements, standardisation and regulations. BC is the foundation of BC-IdM systems, and thus it is at the core of this study. The evaluation factors are essential in determining the reliability and suitability of such systems, particularly in security systems designed to be security guards, such as IdM systems. In addition, cybersecurity risk management for such systems should evaluate the security, technical, application requirements, and organisational aspects to mitigate security risks and ensure functional systems. In this article, we conducted a literature review on BC-IdM systems and identified the components of the BC-IdM ecosystem and the evaluation factors for BC-based IdM systems. The evaluation factors are divided into four main criteria: security and privacy, technical, application, and external factors. Moreover, a case study of BC-IdM in HIoT systems is discussed to show the application evaluation factors.
KW - BC-IdM ecosystem
KW - Blockchain
KW - Evaluation factors
KW - Health IoT
KW - Identity management systems
KW - Security risk management
UR - http://www.scopus.com/inward/record.url?scp=85187771805&partnerID=8YFLogxK
U2 - 10.1007/978-981-99-6974-6_4
DO - 10.1007/978-981-99-6974-6_4
M3 - Conference contribution
AN - SCOPUS:85187771805
SN - 9789819969739
T3 - Springer Proceedings in Complexity
SP - 49
EP - 74
BT - Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media - Cyber Science 2023
A2 - Onwubiko, Cyril
A2 - Rosati, Pierangelo
A2 - Rege, Aunshul
A2 - Erola, Arnau
A2 - Bellekens, Xavier
A2 - Hindy, Hanan
A2 - Jaatun, Martin Gilje
PB - Springer Science and Business Media B.V.
T2 - International Conference on Cybersecurity, Situational Awareness and Social Media, CYBER SCIENCE 2023
Y2 - 3 July 2023 through 4 July 2023
ER -