Cargando…

Cloud to cloud data migration using self sovereign identity for 5G and beyond

The Coronavirus pandemic and the work-from-anywhere has created a shift toward cloud-based services. The pandemic is causing an explosion in cloud migration, expected that by 2025, 95% of workloads will live in the cloud. One of the challenges of the cloud is data security. It is the responsibility...

Descripción completa

Detalles Bibliográficos
Autores principales: Aruna, M. G., Hasan, Mohammad Kamrul, Islam, Shayla, Mohan, K. G., Sharan, Preeta, Hassan, Rosilah
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Springer US 2021
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8591597/
https://www.ncbi.nlm.nih.gov/pubmed/34803477
http://dx.doi.org/10.1007/s10586-021-03461-7
_version_ 1784599284580089856
author Aruna, M. G.
Hasan, Mohammad Kamrul
Islam, Shayla
Mohan, K. G.
Sharan, Preeta
Hassan, Rosilah
author_facet Aruna, M. G.
Hasan, Mohammad Kamrul
Islam, Shayla
Mohan, K. G.
Sharan, Preeta
Hassan, Rosilah
author_sort Aruna, M. G.
collection PubMed
description The Coronavirus pandemic and the work-from-anywhere has created a shift toward cloud-based services. The pandemic is causing an explosion in cloud migration, expected that by 2025, 95% of workloads will live in the cloud. One of the challenges of the cloud is data security. It is the responsibility of cloud service providers to protect user data from unauthorized access. Historically, a third-party auditor (TPA) is used to provide security services over the cloud. With the tremendous growth of demand for cloud-based services, regulatory requirements, there is a need for a semi to fully automated self sovereign identity (SSI) implementation to reduce cost. It’s critical to manage cloud data strategically and extend the required protection. At each stage of the data migration process, such as data discovery, classification, and cataloguing of the access to the mission-critical data, need to be secured. Cloud storage services are centralized, which requires users must place trust in a TPA. With the SSI, this can become decentralized, reducing the dependency and cost. Our current work involves replacing TPA with SSI. A cryptographic technique for secure data migration to and from the cloud using SSI implemented. SSI facilitate peer-to-peer transactions, meaning that the in-between presence of TPA needs no longer be involved. The C2C migration performance is recorded and found the background or foreground replication scenario is achievable. Mathematically computed encrypted and decrypted ASCII values for a word matched with the output by the algorithm. The keys generated by the algorithm are validated with an online validator to ensure the correctness of the generated keys. RSA based mutual TLS algorithm is a good option for SSI based C2C migration. SSI is beneficial because of the low maintenance cost, and users are more and more using a cloud platform. The result of the implemented algorithm shows that the SSI based implementation can provide a 13.32 Kbps encryption/decryption rate which is significantly higher than the TPA method of 1 Kbps.
format Online
Article
Text
id pubmed-8591597
institution National Center for Biotechnology Information
language English
publishDate 2021
publisher Springer US
record_format MEDLINE/PubMed
spelling pubmed-85915972021-11-15 Cloud to cloud data migration using self sovereign identity for 5G and beyond Aruna, M. G. Hasan, Mohammad Kamrul Islam, Shayla Mohan, K. G. Sharan, Preeta Hassan, Rosilah Cluster Comput Article The Coronavirus pandemic and the work-from-anywhere has created a shift toward cloud-based services. The pandemic is causing an explosion in cloud migration, expected that by 2025, 95% of workloads will live in the cloud. One of the challenges of the cloud is data security. It is the responsibility of cloud service providers to protect user data from unauthorized access. Historically, a third-party auditor (TPA) is used to provide security services over the cloud. With the tremendous growth of demand for cloud-based services, regulatory requirements, there is a need for a semi to fully automated self sovereign identity (SSI) implementation to reduce cost. It’s critical to manage cloud data strategically and extend the required protection. At each stage of the data migration process, such as data discovery, classification, and cataloguing of the access to the mission-critical data, need to be secured. Cloud storage services are centralized, which requires users must place trust in a TPA. With the SSI, this can become decentralized, reducing the dependency and cost. Our current work involves replacing TPA with SSI. A cryptographic technique for secure data migration to and from the cloud using SSI implemented. SSI facilitate peer-to-peer transactions, meaning that the in-between presence of TPA needs no longer be involved. The C2C migration performance is recorded and found the background or foreground replication scenario is achievable. Mathematically computed encrypted and decrypted ASCII values for a word matched with the output by the algorithm. The keys generated by the algorithm are validated with an online validator to ensure the correctness of the generated keys. RSA based mutual TLS algorithm is a good option for SSI based C2C migration. SSI is beneficial because of the low maintenance cost, and users are more and more using a cloud platform. The result of the implemented algorithm shows that the SSI based implementation can provide a 13.32 Kbps encryption/decryption rate which is significantly higher than the TPA method of 1 Kbps. Springer US 2021-11-15 2022 /pmc/articles/PMC8591597/ /pubmed/34803477 http://dx.doi.org/10.1007/s10586-021-03461-7 Text en © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021 This article is made available via the PMC Open Access Subset for unrestricted research re-use and secondary analysis in any form or by any means with acknowledgement of the original source. These permissions are granted for the duration of the World Health Organization (WHO) declaration of COVID-19 as a global pandemic.
spellingShingle Article
Aruna, M. G.
Hasan, Mohammad Kamrul
Islam, Shayla
Mohan, K. G.
Sharan, Preeta
Hassan, Rosilah
Cloud to cloud data migration using self sovereign identity for 5G and beyond
title Cloud to cloud data migration using self sovereign identity for 5G and beyond
title_full Cloud to cloud data migration using self sovereign identity for 5G and beyond
title_fullStr Cloud to cloud data migration using self sovereign identity for 5G and beyond
title_full_unstemmed Cloud to cloud data migration using self sovereign identity for 5G and beyond
title_short Cloud to cloud data migration using self sovereign identity for 5G and beyond
title_sort cloud to cloud data migration using self sovereign identity for 5g and beyond
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8591597/
https://www.ncbi.nlm.nih.gov/pubmed/34803477
http://dx.doi.org/10.1007/s10586-021-03461-7
work_keys_str_mv AT arunamg cloudtoclouddatamigrationusingselfsovereignidentityfor5gandbeyond
AT hasanmohammadkamrul cloudtoclouddatamigrationusingselfsovereignidentityfor5gandbeyond
AT islamshayla cloudtoclouddatamigrationusingselfsovereignidentityfor5gandbeyond
AT mohankg cloudtoclouddatamigrationusingselfsovereignidentityfor5gandbeyond
AT sharanpreeta cloudtoclouddatamigrationusingselfsovereignidentityfor5gandbeyond
AT hassanrosilah cloudtoclouddatamigrationusingselfsovereignidentityfor5gandbeyond