TY - GEN
T1 - A Comparative Analysis Between SciTokens, Verifiable Credentials, and Smart Contracts
T2 - 2023 Practice and Experience in Advanced Research Computing, PEARC 2023
AU - Hossain Faruk, Md Jobair
AU - Saha, Bilash
AU - Basney, Jim
N1 - This material is based upon work supported by the National Science Foundation under grant number 2114989.
PY - 2023/7/23
Y1 - 2023/7/23
N2 - Managing and exchanging sensitive information securely is a paramount concern for the scientific and cybersecurity community. The increasing reliance on computing workflows and digital data transactions requires ensuring that sensitive information is protected from unauthorized access, tampering, or misuse. This research paper presents a comparative analysis of three novel approaches for authenticating and securing access to scientific data: SciTokens, Verifiable Credentials, and Smart Contracts. The aim of this study is to investigate the strengths and weaknesses of each approach from trust, revocation, privacy, and security perspectives. We examine the technical features and privacy and security mechanisms of each technology and provide a comparative synthesis with the proposed model. Through our analysis, we demonstrate that each technology offers unique advantages and limitations, and the integration of these technologies can lead to more secure and efficient solutions for authentication and access to scientific data.
AB - Managing and exchanging sensitive information securely is a paramount concern for the scientific and cybersecurity community. The increasing reliance on computing workflows and digital data transactions requires ensuring that sensitive information is protected from unauthorized access, tampering, or misuse. This research paper presents a comparative analysis of three novel approaches for authenticating and securing access to scientific data: SciTokens, Verifiable Credentials, and Smart Contracts. The aim of this study is to investigate the strengths and weaknesses of each approach from trust, revocation, privacy, and security perspectives. We examine the technical features and privacy and security mechanisms of each technology and provide a comparative synthesis with the proposed model. Through our analysis, we demonstrate that each technology offers unique advantages and limitations, and the integration of these technologies can lead to more secure and efficient solutions for authentication and access to scientific data.
KW - Blockchain
KW - JWT
KW - SciTokens
KW - Smart Contracts
KW - Verifiable Credentials
UR - http://www.scopus.com/inward/record.url?scp=85176269620&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85176269620&partnerID=8YFLogxK
U2 - 10.1145/3569951.3597566
DO - 10.1145/3569951.3597566
M3 - Conference contribution
AN - SCOPUS:85176269620
T3 - PEARC 2023 - Computing for the common good: Practice and Experience in Advanced Research Computing
SP - 302
EP - 305
BT - PEARC 2023 - Computing for the common good
PB - Association for Computing Machinery
Y2 - 23 July 2023 through 27 July 2023
ER -