Show simple item record

dc.contributor.authorde Diego, Santiago
dc.contributor.authorRegueiro, Cristina
dc.contributor.authorMacia-Fernandez, Gabriel
dc.date.accessioned2021-12-14T14:57:16Z
dc.date.available2021-12-14T14:57:16Z
dc.date.issued2021-11
dc.identifier.urihttp://hdl.handle.net/11556/1242
dc.description.abstractThe IoT-as-a-Service (IoTaaS) business model has already been identified by some people from both industry and academia, but has not been formally defined. IoTaaS offers IoT devices on demand, with considerable cost savings and resource optimization. In addition, it enables different applications to reuse the existing devices. However, this business model is associated with different technological challenges that need to be addressed, one of which is the identity problem. Focusing on this, self-sovereign identity (SSI) schemes have proven to provide better privacy and scalability than traditional identity paradigms, which is especially important in the IoT owing to its characteristics. In this paper, we formally analyze an IoTaaS business model, identifying and detailing its main technological challenges. In addition, we tackle the identity problem of this business model and propose an SSI-based identity management system, which is compliant with the existing standards from the W3C, and include a performance evaluation.en
dc.description.sponsorshipThis work was supported in part by the Basque Country Government through the Collaborative Research Grants Program in Strategic Areas (ELKARTEK) Program by the Project TRUSTIND under Grant KK-2020/00054 and in part by the Spanish Government-Ministry of Science and Innovation through the Project AI4ES-2021 under Grant CER-20211030 and through the Project SICRAC under Grant PID2020-114495RB-I00en
dc.language.isoengen
dc.publisherInstitute of Electrical and Electronics Engineers Inc.en
dc.rightsAttribution 4.0 International*
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/*
dc.titleEnabling Identity for the IoT-as-a-Service Business Modelen
dc.typearticleen
dc.identifier.doi10.1109/ACCESS.2021.3131012en
dc.rights.accessRightsopenAccessen
dc.subject.keywordsBusinessen
dc.subject.keywordsSecurityen
dc.subject.keywordsAnalytical modelsen
dc.subject.keywordsDistributed ledgeren
dc.subject.keywordsCostsen
dc.subject.keywordsCertificationen
dc.subject.keywordsPerformance evaluationen
dc.identifier.essn2169-3536en
dc.journal.titleIEEE Accessen
dc.page.final159975en
dc.page.initial159965en
dc.volume.number9en


Files in this item

Thumbnail

    Show simple item record

    Attribution 4.0 InternationalExcept where otherwise noted, this item's license is described as Attribution 4.0 International