Table 2.
Security Requirement Evaluation.
| Requirement | Model Solution | Reference |
|---|---|---|
| Confidentiality | Proof of Authority, Public Key | Section 6 |
| Authorization | Using Public Key and Lightweight Digital Signature | Section 5.2 |
| User control | Proof of Authority | Section 7 |
| Integrity | Hashing of data blocks | Section 4 |
| Availability | Achieved by limiting acceptable transactions | Section 4 |
| Anonymity | Lightweight Ring Signature | Section 5.3 |