2021
DOI: 10.1109/access.2021.3131012
|View full text |Cite
|
Sign up to set email alerts
|

Enabling Identity for the IoT-as-a-Service Business Model

Abstract: The IoT-as-a-Service (IoTaaS) business model has already been identified by some people from both industry and academia, but has not been formally defined. IoTaaS offers IoT devices on demand, with considerable cost savings and resource optimization. In addition, it enables different applications to reuse the existing devices. However, this business model is associated with different technological challenges that need to be addressed, one of which is the identity problem. Focusing on this, self-sovereign ident… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(2 citation statements)
references
References 38 publications
(44 reference statements)
0
2
0
Order By: Relevance
“…De Diego et al [82] leverage SSI in order to create an IoT-as-a-service (IoTaaS) business model. In particular, the authors highlight the importance of IoTaaS as a model that offers IoT devices on demand, which results in lower costs, optimized use of resources and the ability to reuse an IoT device.…”
Section: Applications Of Ssi In the Iotmentioning
confidence: 99%
See 1 more Smart Citation
“…De Diego et al [82] leverage SSI in order to create an IoT-as-a-service (IoTaaS) business model. In particular, the authors highlight the importance of IoTaaS as a model that offers IoT devices on demand, which results in lower costs, optimized use of resources and the ability to reuse an IoT device.…”
Section: Applications Of Ssi In the Iotmentioning
confidence: 99%
“…VCs can also be revoked and thus when a device should no longer have access to a resource or when it is compromised, the permission to use this resource can be easily denied. ZKPs and selective disclosure are used in several papers [7,79,82]. In these systems, device owners are able to select the attributes they will disclose to the Verifier, while no additional data is required for the verification process.…”
Section: Contributions To Privacymentioning
confidence: 99%