Affiliations 

  • 1 Department of Computer Science and Engineering, M S Engineering College, Bengaluru, Karnataka 562110 India
  • 2 Center for Cyber Security, Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, UKM, 43600 Bangi, Selangor Malaysia
  • 3 Department of Computer Science, Institute of Computer Science and Digital Innovation, UCSI University, 56000 Kuala Lumpur, Malaysia
  • 4 Department of Computer Science and Engineering, GITAM University, Bengaluru, Karnataka 560064 India
  • 5 Department of Electrical and Communication Engineering, The Oxford Engineering College, Bengaluru, Karnataka 560064 India
Cluster Comput, 2021 Nov 15.
PMID: 34803477 DOI: 10.1007/s10586-021-03461-7

Abstract

The Coronavirus pandemic and the work-from-anywhere has created a shift toward cloud-based services. The pandemic is causing an explosion in cloud migration, expected that by 2025, 95% of workloads will live in the cloud. One of the challenges of the cloud is data security. It is the responsibility of cloud service providers to protect user data from unauthorized access. Historically, a third-party auditor (TPA) is used to provide security services over the cloud. With the tremendous growth of demand for cloud-based services, regulatory requirements, there is a need for a semi to fully automated self sovereign identity (SSI) implementation to reduce cost. It's critical to manage cloud data strategically and extend the required protection. At each stage of the data migration process, such as data discovery, classification, and cataloguing of the access to the mission-critical data, need to be secured. Cloud storage services are centralized, which requires users must place trust in a TPA. With the SSI, this can become decentralized, reducing the dependency and cost. Our current work involves replacing TPA with SSI. A cryptographic technique for secure data migration to and from the cloud using SSI implemented. SSI facilitate peer-to-peer transactions, meaning that the in-between presence of TPA needs no longer be involved. The C2C migration performance is recorded and found the background or foreground replication scenario is achievable. Mathematically computed encrypted and decrypted ASCII values for a word matched with the output by the algorithm. The keys generated by the algorithm are validated with an online validator to ensure the correctness of the generated keys. RSA based mutual TLS algorithm is a good option for SSI based C2C migration. SSI is beneficial because of the low maintenance cost, and users are more and more using a cloud platform. The result of the implemented algorithm shows that the SSI based implementation can provide a 13.32 Kbps encryption/decryption rate which is significantly higher than the TPA method of 1 Kbps.

* Title and MeSH Headings from MEDLINE®/PubMed®, a database of the U.S. National Library of Medicine.