Cargando…
Cloud to cloud data migration using self sovereign identity for 5G and beyond
The Coronavirus pandemic and the work-from-anywhere has created a shift toward cloud-based services. The pandemic is causing an explosion in cloud migration, expected that by 2025, 95% of workloads will live in the cloud. One of the challenges of the cloud is data security. It is the responsibility...
Autores principales: | , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Springer US
2021
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8591597/ https://www.ncbi.nlm.nih.gov/pubmed/34803477 http://dx.doi.org/10.1007/s10586-021-03461-7 |
_version_ | 1784599284580089856 |
---|---|
author | Aruna, M. G. Hasan, Mohammad Kamrul Islam, Shayla Mohan, K. G. Sharan, Preeta Hassan, Rosilah |
author_facet | Aruna, M. G. Hasan, Mohammad Kamrul Islam, Shayla Mohan, K. G. Sharan, Preeta Hassan, Rosilah |
author_sort | Aruna, M. G. |
collection | PubMed |
description | The Coronavirus pandemic and the work-from-anywhere has created a shift toward cloud-based services. The pandemic is causing an explosion in cloud migration, expected that by 2025, 95% of workloads will live in the cloud. One of the challenges of the cloud is data security. It is the responsibility of cloud service providers to protect user data from unauthorized access. Historically, a third-party auditor (TPA) is used to provide security services over the cloud. With the tremendous growth of demand for cloud-based services, regulatory requirements, there is a need for a semi to fully automated self sovereign identity (SSI) implementation to reduce cost. It’s critical to manage cloud data strategically and extend the required protection. At each stage of the data migration process, such as data discovery, classification, and cataloguing of the access to the mission-critical data, need to be secured. Cloud storage services are centralized, which requires users must place trust in a TPA. With the SSI, this can become decentralized, reducing the dependency and cost. Our current work involves replacing TPA with SSI. A cryptographic technique for secure data migration to and from the cloud using SSI implemented. SSI facilitate peer-to-peer transactions, meaning that the in-between presence of TPA needs no longer be involved. The C2C migration performance is recorded and found the background or foreground replication scenario is achievable. Mathematically computed encrypted and decrypted ASCII values for a word matched with the output by the algorithm. The keys generated by the algorithm are validated with an online validator to ensure the correctness of the generated keys. RSA based mutual TLS algorithm is a good option for SSI based C2C migration. SSI is beneficial because of the low maintenance cost, and users are more and more using a cloud platform. The result of the implemented algorithm shows that the SSI based implementation can provide a 13.32 Kbps encryption/decryption rate which is significantly higher than the TPA method of 1 Kbps. |
format | Online Article Text |
id | pubmed-8591597 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2021 |
publisher | Springer US |
record_format | MEDLINE/PubMed |
spelling | pubmed-85915972021-11-15 Cloud to cloud data migration using self sovereign identity for 5G and beyond Aruna, M. G. Hasan, Mohammad Kamrul Islam, Shayla Mohan, K. G. Sharan, Preeta Hassan, Rosilah Cluster Comput Article The Coronavirus pandemic and the work-from-anywhere has created a shift toward cloud-based services. The pandemic is causing an explosion in cloud migration, expected that by 2025, 95% of workloads will live in the cloud. One of the challenges of the cloud is data security. It is the responsibility of cloud service providers to protect user data from unauthorized access. Historically, a third-party auditor (TPA) is used to provide security services over the cloud. With the tremendous growth of demand for cloud-based services, regulatory requirements, there is a need for a semi to fully automated self sovereign identity (SSI) implementation to reduce cost. It’s critical to manage cloud data strategically and extend the required protection. At each stage of the data migration process, such as data discovery, classification, and cataloguing of the access to the mission-critical data, need to be secured. Cloud storage services are centralized, which requires users must place trust in a TPA. With the SSI, this can become decentralized, reducing the dependency and cost. Our current work involves replacing TPA with SSI. A cryptographic technique for secure data migration to and from the cloud using SSI implemented. SSI facilitate peer-to-peer transactions, meaning that the in-between presence of TPA needs no longer be involved. The C2C migration performance is recorded and found the background or foreground replication scenario is achievable. Mathematically computed encrypted and decrypted ASCII values for a word matched with the output by the algorithm. The keys generated by the algorithm are validated with an online validator to ensure the correctness of the generated keys. RSA based mutual TLS algorithm is a good option for SSI based C2C migration. SSI is beneficial because of the low maintenance cost, and users are more and more using a cloud platform. The result of the implemented algorithm shows that the SSI based implementation can provide a 13.32 Kbps encryption/decryption rate which is significantly higher than the TPA method of 1 Kbps. Springer US 2021-11-15 2022 /pmc/articles/PMC8591597/ /pubmed/34803477 http://dx.doi.org/10.1007/s10586-021-03461-7 Text en © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021 This article is made available via the PMC Open Access Subset for unrestricted research re-use and secondary analysis in any form or by any means with acknowledgement of the original source. These permissions are granted for the duration of the World Health Organization (WHO) declaration of COVID-19 as a global pandemic. |
spellingShingle | Article Aruna, M. G. Hasan, Mohammad Kamrul Islam, Shayla Mohan, K. G. Sharan, Preeta Hassan, Rosilah Cloud to cloud data migration using self sovereign identity for 5G and beyond |
title | Cloud to cloud data migration using self sovereign identity for 5G and beyond |
title_full | Cloud to cloud data migration using self sovereign identity for 5G and beyond |
title_fullStr | Cloud to cloud data migration using self sovereign identity for 5G and beyond |
title_full_unstemmed | Cloud to cloud data migration using self sovereign identity for 5G and beyond |
title_short | Cloud to cloud data migration using self sovereign identity for 5G and beyond |
title_sort | cloud to cloud data migration using self sovereign identity for 5g and beyond |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8591597/ https://www.ncbi.nlm.nih.gov/pubmed/34803477 http://dx.doi.org/10.1007/s10586-021-03461-7 |
work_keys_str_mv | AT arunamg cloudtoclouddatamigrationusingselfsovereignidentityfor5gandbeyond AT hasanmohammadkamrul cloudtoclouddatamigrationusingselfsovereignidentityfor5gandbeyond AT islamshayla cloudtoclouddatamigrationusingselfsovereignidentityfor5gandbeyond AT mohankg cloudtoclouddatamigrationusingselfsovereignidentityfor5gandbeyond AT sharanpreeta cloudtoclouddatamigrationusingselfsovereignidentityfor5gandbeyond AT hassanrosilah cloudtoclouddatamigrationusingselfsovereignidentityfor5gandbeyond |