{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T08:37:52Z","timestamp":1758271072931,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":53,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,8,29]],"date-time":"2023-08-29T00:00:00Z","timestamp":1693267200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,8,29]]},"DOI":"10.1145\/3600160.3604997","type":"proceedings-article","created":{"date-parts":[[2023,8,9]],"date-time":"2023-08-09T22:54:41Z","timestamp":1691621681000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["TRUSTEE: Towards the creation of secure, trustworthy and privacy-preserving framework"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9164-7672","authenticated-orcid":false,"given":"Sarwar","family":"Sayeed","sequence":"first","affiliation":[{"name":"School of Computing, Engineering &amp; the Built Environment, Edinburgh Napier University, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3392-9970","authenticated-orcid":false,"given":"Nikolaos","family":"Pitropakis","sequence":"additional","affiliation":[{"name":"School of Computing, Engineering &amp; the Built Environment, Edinburgh Napier University, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0809-3523","authenticated-orcid":false,"given":"William J.","family":"Buchanan","sequence":"additional","affiliation":[{"name":"School of Computing, Engineering &amp; the Built Environment, Edinburgh Napier University, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0959-598X","authenticated-orcid":false,"given":"Evangelos","family":"Markakis","sequence":"additional","affiliation":[{"name":"Hellenic Mediterranean University Research Center, Greece"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8894-617X","authenticated-orcid":false,"given":"Dimitra","family":"Papatsaroucha","sequence":"additional","affiliation":[{"name":"Hellenic Mediterranean University Research Center, Greece"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1083-0345","authenticated-orcid":false,"given":"Ilias","family":"Politis","sequence":"additional","affiliation":[{"name":"InQbit\/Industrial Systems Institute ATHENA RC, Romania"}]}],"member":"320","published-online":{"date-parts":[[2023,8,29]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.3390\/app9152953"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1016\/j.pmcj.2019.101050"},{"unstructured":"Hasib Anwar. 2020. Why Hyperledger Indy Is Important For Digital Identities?https:\/\/101blockchains.com\/hyperledger-indy\/","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","volume-title":"IPFS: What it is, How it works, and Why it\u2019s needed. https:\/\/medium.com\/@sjarancio\/ipfs-what-it-is-how-it-works-and-why-its-needed-49b75d8e857b","author":"Arancio Stephen","year":"2021","unstructured":"Stephen Arancio. 2021. IPFS: What it is, How it works, and Why it\u2019s needed. https:\/\/medium.com\/@sjarancio\/ipfs-what-it-is-how-it-works-and-why-its-needed-49b75d8e857b"},{"unstructured":"Sulaiman Asif. 2023. What is Information Security Principles Types. https:\/\/www.knowledgehut.com\/blog\/security\/what-is-information-security","key":"e_1_3_2_1_5_1"},{"doi-asserted-by":"crossref","unstructured":"Hamza Baniata Tamas Pflanzner Zoltan Feher and Attila Kert\u00e9sz. 2022. Latency Assessment of Blockchain-based SSI Applications Utilizing Hyperledger Indy.. In CLOSER. 264\u2013271.","key":"e_1_3_2_1_6_1","DOI":"10.5220\/0011082300003200"},{"unstructured":"Macy Bayern. 2019. 60% of companies experienced insider attacks in the last year. https:\/\/www.techrepublic.com\/article\/60-of-companies-experienced-insider-attacks-in-the-last-year\/","key":"e_1_3_2_1_7_1"},{"key":"e_1_3_2_1_8_1","volume-title":"On the Security and Privacy of Hyperledger Fabric: Challenges and Open Issues. 2020 IEEE World Congress on Services (SERVICES)","author":"Brotsis Sotirios","year":"2020","unstructured":"Sotirios Brotsis, Nicholas Kolokotronis, Konstantinos Limniotis, Gueltoum Bendiab, and Stavros\u00a0N. Shiaeles. 2020. On the Security and Privacy of Hyperledger Fabric: Challenges and Open Issues. 2020 IEEE World Congress on Services (SERVICES) (2020), 197\u2013204."},{"unstructured":"National Cyber\u00a0Security Centre. 2016. Data breach of 500m Yahoo accounts. https:\/\/www.ncsc.gov.uk\/news\/data-breach-500m-yahoo-accounts","key":"e_1_3_2_1_9_1"},{"unstructured":"National Cyber\u00a0Security Centre. 2016. Denial of Service (DoS) guidance. https:\/\/www.ncsc.gov.uk\/collection\/denial-service-dos-guidance-collection","key":"e_1_3_2_1_10_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1109\/BigData.2017.8258226"},{"unstructured":"Chris Cordi. 2021. Hyperledger Fabric Security Monitoring with Splunk. https:\/\/www.splunk.com\/en_us\/blog\/security\/hyperledger-fabric-security-monitoring-with-splunk.html","key":"e_1_3_2_1_12_1"},{"unstructured":"Christopher Cordi. 2021. Hyperledger Fabric Security Threats: What to Look For. https:\/\/www.hyperledger.org\/blog\/2021\/11\/18\/hyperledger-fabric-security-threats-what-to-look-for","key":"e_1_3_2_1_13_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1155\/2022"},{"unstructured":"Elastos. 2021. Decentralized Cloud Storage: The Future of Data Storage?https:\/\/elastos.info\/blog\/decentralized-cloud-storage-the-future-of-data-storage\/","key":"e_1_3_2_1_15_1"},{"key":"e_1_3_2_1_16_1","volume-title":"6 Insider Cloud Security Threats to Look Out for","author":"ElDeeb Injy","year":"2022","unstructured":"Injy ElDeeb. 2022. 6 Insider Cloud Security Threats to Look Out for in 2022. https:\/\/gatlabs.com\/blogpost\/insider-cloud-security-threats-watch-out-for\/"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1109\/MCC.2018.011791712"},{"unstructured":"Noah Fields. 2022. Blockchain Self-Sovereign Identity: True Control Of Your Identity. https:\/\/komodoplatform.com\/en\/academy\/self-sovereign-identity\/","key":"e_1_3_2_1_18_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.3390\/app11010414"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_20_1","DOI":"10.5555\/2907333.2907524"},{"unstructured":"Forbes. 2022. Numerous Cyber Attacks Using IPFS Decentralized Network Seen. https:\/\/forbesnetworks.com\/our-blogs\/f\/numerous-cyber-attacks-using-ipfs-decentralized-network-seen","key":"e_1_3_2_1_21_1"},{"volume-title":"Gartner Forecasts Worldwide Security and Risk Management Spending to Exceed $150 Billion","year":"2021","unstructured":"Gartner. 2021. Gartner Forecasts Worldwide Security and Risk Management Spending to Exceed $150 Billion in 2021. https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2021-05-17-gartner-forecasts-worldwide-security-and-risk-managem","key":"e_1_3_2_1_22_1"},{"unstructured":"GDPR.EU. 2023. What is GDPR the EU\u2019s new data protection law?https:\/\/gdpr.eu\/what-is-gdpr\/","key":"e_1_3_2_1_23_1"},{"key":"e_1_3_2_1_24_1","volume-title":"Microsoft Data Breaches: Full Timeline Through","author":"Heiligenstein X.","year":"2022","unstructured":"Michael\u00a0X. Heiligenstein. 2022. Microsoft Data Breaches: Full Timeline Through 2022. https:\/\/firewalltimes.com\/microsoft-data-breach-timeline\/"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_25_1","DOI":"10.1109\/ICFCN.2012.6206859"},{"unstructured":"IPFS. 2023. Privacy and encryption. https:\/\/docs.ipfs.tech\/concepts\/privacy-and-encryption\/#what-s-public-on-ipfs","key":"e_1_3_2_1_26_1"},{"unstructured":"Chandramohan Jagtap. 2022. Hyperledger Caliper Integration In Hyperledger Fabric Blockchain. https:\/\/medium.com\/geekculture\/caliper-integration-in-hyperledger-fabric-blockchain-5762c1e8b241","key":"e_1_3_2_1_27_1"},{"unstructured":"Aditya Joshi. 2020. Integrating Hyperledger Explorer with Hyperledger Fabric Network v2.2. https:\/\/medium.com\/coinmonks\/integrating-hyperledger-explorer-with-hyperledger-fabric-network-v2-2-9a70e4c5311","key":"e_1_3_2_1_28_1"},{"key":"e_1_3_2_1_29_1","volume-title":"IPFS: The New Hotbed of Phishing. https:\/\/www.trustwave.com\/en-us\/resources\/blogs\/spiderlabs-blog\/ipfs-the-new-hotbed-of-phishing\/","author":"Karla\u00a0Agregado Katrina\u00a0Udquin","year":"2022","unstructured":"Katrina\u00a0Udquin Karla\u00a0Agregado. 2022. IPFS: The New Hotbed of Phishing. https:\/\/www.trustwave.com\/en-us\/resources\/blogs\/spiderlabs-blog\/ipfs-the-new-hotbed-of-phishing\/"},{"unstructured":"GLEN KOSAKA. 2019. Container Security Monitoring with Prometheus and Grafana. https:\/\/blog.neuvector.com\/article\/prometheus-grafana","key":"e_1_3_2_1_30_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_31_1","DOI":"10.1016\/j.simpat.2022.102674"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_32_1","DOI":"10.3390\/s22062291"},{"unstructured":"Julien Maury. 2021. How to Use MITRE ATT&CK to Understand Attacker Behavior. https:\/\/www.esecurityplanet.com\/networks\/use-mitre-attck-to-understand-attacker-behavior\/","key":"e_1_3_2_1_33_1"},{"key":"e_1_3_2_1_34_1","volume-title":"Top 10 Cybersecurity Predictions And Statistics For","author":"Morgan Steve","year":"2023","unstructured":"Steve Morgan. 2022. Top 10 Cybersecurity Predictions And Statistics For 2023. https:\/\/cybersecurityventures.com\/top-5-cybersecurity-facts-figures-predictions-and-statistics-for-2021-to-2025\/"},{"unstructured":"Marco\u00a0Polo Network. 2021. Difference Blockchain and DLT. https:\/\/sentientmedia.org\/fish-farmer","key":"e_1_3_2_1_35_1"},{"doi-asserted-by":"crossref","unstructured":"Nikolaos Pitropakis Emmanouil\u00a0A. Panaousis Alkiviadis Giannakoulias George Kalpakis Rodrigo\u00a0Diaz Rodriguez and Panayiotis Sarigiannidis. 2018. An Enhanced Cyber Attack Attribution Framework. In Trust and Privacy in Digital Business.","key":"e_1_3_2_1_36_1","DOI":"10.1007\/978-3-319-98385-1_15"},{"unstructured":"Sarwar Sayeed. 2020. Securing Blockchain Technology From Cryptocurrencies to Smart Contracts. https:\/\/ethos.bl.uk\/OrderDetails.do?uin=uk.bl.ethos.847765","key":"e_1_3_2_1_37_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_38_1","DOI":"10.1109\/ACCESS.2020.2970495"},{"unstructured":"SHOBHIT SETH. 2022. Public Private Permissioned Blockchains Compared. https:\/\/www.investopedia.com\/news\/public-private-permissioned-blockchains-compared\/","key":"e_1_3_2_1_39_1"},{"key":"e_1_3_2_1_40_1","volume-title":"Materials Today: Proceedings","author":"Shuaib Mohammed","year":"2021","unstructured":"Mohammed Shuaib, Shadab Alam, Mohammad\u00a0Shabbir Alam, and Mohammad\u00a0Shahnawaz Nasir. 2021. Self-sovereign identity for healthcare using blockchain. Materials Today: Proceedings (2021)."},{"volume-title":"\u201cGDPR compliant","author":"Snellinckx Jonas","unstructured":"Jonas Snellinckx. 2018. Private data, a built-in \u201cGDPR compliant\u201d solution for Hyperledger Fabric. https:\/\/medium.com\/hackernoon\/private-data-a-built-in-gdpr-compliant-solution-for-hyperledger-fabric-5a35b91e6aaa","key":"e_1_3_2_1_41_1"},{"unstructured":"Sovrin. 2018. What is self-sovereign Identity?https:\/\/sovrin.org\/faq\/what-is-self-sovereign-identity\/","key":"e_1_3_2_1_42_1"},{"key":"e_1_3_2_1_43_1","volume-title":"Introduction to side-channel attacks. Secure integrated circuits and systems","author":"Standaert Fran\u00e7ois-Xavier","year":"2010","unstructured":"Fran\u00e7ois-Xavier Standaert. 2010. Introduction to side-channel attacks. Secure integrated circuits and systems (2010), 27\u201342."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_44_1","DOI":"10.1109\/MNET.011.2000473"},{"unstructured":"Technical and Business Consulting. 2021. What are the 6 Phases of the Data Lifecycle?https:\/\/blog.tbconsulting.com\/what-are-the-phases-of-the-data-lifecycle","key":"e_1_3_2_1_45_1"},{"unstructured":"TIGERA. 2023. Prometheus Monitoring. https:\/\/www.tigera.io\/learn\/guides\/prometheus-monitoring\/","key":"e_1_3_2_1_46_1"},{"unstructured":"Kevin Townsend. 2022. Attackers Using IPFS for Distributed Bulletproof Malware Hosting. https:\/\/www.securityweek.com\/attackers-using-ipfs-distributed-bulletproof-malware-hosting\/","key":"e_1_3_2_1_47_1"},{"unstructured":"Trellix. 2023. What Is the MITRE ATT&CK Framework?https:\/\/www.trellix.com\/en-us\/security-awareness\/cybersecurity\/what-is-mitre-attack-framework.html","key":"e_1_3_2_1_48_1"},{"volume-title":"Blockchain access control ecosystem for big data security. In 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications","author":"Uchibeke Uchi\u00a0Ugobame","unstructured":"Uchi\u00a0Ugobame Uchibeke, Kevin\u00a0A Schneider, Sara\u00a0Hosseinzadeh Kassani, and Ralph Deters. 2018. Blockchain access control ecosystem for big data security. In 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE, 1373\u20131378.","key":"e_1_3_2_1_49_1"},{"unstructured":"Vera. 2021. Top Data Security Challenges Organizations Face Today. https:\/\/www.vera.com\/general\/top-data-security-challenges-organizations-face-today\/","key":"e_1_3_2_1_50_1"},{"unstructured":"Ryan Yackel. 2021. What is homomorphic encryption and why isn\u2019t it mainstream?https:\/\/www.keyfactor.com\/blog\/what-is-homomorphic-encryption\/","key":"e_1_3_2_1_51_1"},{"unstructured":"DAVID\u00a0DIAS YIANNIS\u00a0PSARASJORGE Jorge M.\u00a0SOARES. 2022. Why the internet need the IPFS. https:\/\/spectrum.ieee.org\/peer-to-peer-network","key":"e_1_3_2_1_52_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_53_1","DOI":"10.1109\/ACCESS.2018.2890736"}],"event":{"acronym":"ARES 2023","name":"ARES 2023: The 18th International Conference on Availability, Reliability and Security","location":"Benevento Italy"},"container-title":["Proceedings of the 18th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3600160.3604997","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3600160.3604997","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:13Z","timestamp":1750178173000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3600160.3604997"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,29]]},"references-count":53,"alternative-id":["10.1145\/3600160.3604997","10.1145\/3600160"],"URL":"https:\/\/doi.org\/10.1145\/3600160.3604997","relation":{},"subject":[],"published":{"date-parts":[[2023,8,29]]},"assertion":[{"value":"2023-08-29","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}