Cloud to cloud data migration using self sovereign identity for 5G and beyond

被引:12
作者
Aruna, M. G. [1 ]
Hasan, Mohammad Kamrul [2 ]
Islam, Shayla [3 ]
Mohan, K. G. [4 ]
Sharan, Preeta [5 ]
Hassan, Rosilah [2 ]
机构
[1] MS Engn Coll, Dept Comp Sci & Engn, Bengaluru 562110, Karnataka, India
[2] Univ Kebangsaan Malaysia, Fac Informat Sci & Technol, Ctr Cyber Secur, Bangi 43600, Selangor, Malaysia
[3] UCSI Univ, Inst Comp Sci & Digital Innovat, Dept Comp Sci, Kuala Lumpur 56000, Malaysia
[4] GITAM Univ, Dept Comp Sci & Engn, Bengaluru 560064, Karnataka, India
[5] Oxford Engn Coll, Dept Elect & Commun Engn, Bengaluru 560064, Karnataka, India
来源
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS | 2022年 / 25卷 / 04期
关键词
Transport layer security (TLS); Third-party auditor (TPA); Self-sovereign identity (SSI); Cloud migration; Public key infrastructure (PKI); Certificate authority (CA); Registration authority (RA); Certificate management system; Revocation services; Digital signature; ACCESS-CONTROL; LIGHTWEIGHT; SCHEME; SECURE;
D O I
10.1007/s10586-021-03461-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Coronavirus pandemic and the work-from-anywhere has created a shift toward cloud-based services. The pandemic is causing an explosion in cloud migration, expected that by 2025, 95% of workloads will live in the cloud. One of the challenges of the cloud is data security. It is the responsibility of cloud service providers to protect user data from unauthorized access. Historically, a third-party auditor (TPA) is used to provide security services over the cloud. With the tremendous growth of demand for cloud-based services, regulatory requirements, there is a need for a semi to fully automated self sovereign identity (SSI) implementation to reduce cost. It's critical to manage cloud data strategically and extend the required protection. At each stage of the data migration process, such as data discovery, classification, and cataloguing of the access to the mission-critical data, need to be secured. Cloud storage services are centralized, which requires users must place trust in a TPA. With the SSI, this can become decentralized, reducing the dependency and cost. Our current work involves replacing TPA with SSI. A cryptographic technique for secure data migration to and from the cloud using SSI implemented. SSI facilitate peer-to-peer transactions, meaning that the in-between presence of TPA needs no longer be involved. The C2C migration performance is recorded and found the background or foreground replication scenario is achievable. Mathematically computed encrypted and decrypted ASCII values for a word matched with the output by the algorithm. The keys generated by the algorithm are validated with an online validator to ensure the correctness of the generated keys. RSA based mutual TLS algorithm is a good option for SSI based C2C migration. SSI is beneficial because of the low maintenance cost, and users are more and more using a cloud platform. The result of the implemented algorithm shows that the SSI based implementation can provide a 13.32 Kbps encryption/decryption rate which is significantly higher than the TPA method of 1 Kbps.
引用
收藏
页码:2317 / 2331
页数:15
相关论文
共 56 条
[1]  
AHMAD N, 2018, IEEE 5 INT C ENG TEC, P1, DOI DOI 10.1109/ICETAS.2018.8629101
[2]   Optimizing Energy Consumption for Cloud Internet of Things [J].
Ahmed, Zeinab E. ;
Hasan, Mohammad Kamrul ;
Saeed, Rashid A. ;
Hassan, Rosilah ;
Islam, Shayla ;
Mokhtar, Rania A. ;
Khan, Sheroz ;
Akhtaruzzaman .
FRONTIERS IN PHYSICS, 2020, 8
[3]   HSIC Bottleneck Based Distributed Deep Learning Model for Load Forecasting in Smart Grid With a Comprehensive Survey [J].
Akhtaruzzaman, Md. ;
Hasan, Mohammad Kamrul ;
Kabir, S. Rayhan ;
Abdullah, Siti Norul Huda Sheikh ;
Sadeq, Muhammad Jafar ;
Hossain, Eklas .
IEEE ACCESS, 2020, 8 :222977-223008
[4]   DaSCE: Data Security for Cloud Environment with Semi-Trusted Third Party [J].
Ali, Mazhar ;
Malik, Saif U. R. ;
Khan, Samee U. .
IEEE TRANSACTIONS ON CLOUD COMPUTING, 2017, 5 (04) :642-655
[5]   An accurate and high-efficient QuBits steganography scheme based on hybrid neural networks [J].
Alsalhi, Yahya .
MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (12) :17077-17093
[6]   Lightweight and secure authentication scheme for IoT network based on publish-subscribe fog computing model [J].
Amanlou, Sanaz ;
Hasan, Mohammad Kamrul ;
Abu Bakar, Khairul Azmi .
COMPUTER NETWORKS, 2021, 199
[7]  
[Anonymous], 2011, DIGINOTAR REMOVAL FO
[8]  
Aruna MG, 2020, CHINA COMMUN, V17, P168, DOI 10.23919/JCC.2020.05.014
[9]   Forced Perspectives Evaluating an SSL Trust Enhancement at Scale [J].
Bates, Adam ;
Pletcher, Joe ;
Nichols, Tyler ;
Hollembaek, Braden ;
Butler, Kevin R. B. .
PROCEEDINGS OF THE 2014 ACM INTERNET MEASUREMENT CONFERENCE (IMC'14), 2014, :503-509
[10]  
Braga J., 2017, P CSBC 2017 NACJ ORE, P8