2021
DOI: 10.1007/s10586-021-03461-7
|View full text |Cite
|
Sign up to set email alerts
|

Cloud to cloud data migration using self sovereign identity for 5G and beyond

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 19 publications
(11 citation statements)
references
References 46 publications
0
11
0
Order By: Relevance
“…With the immense magnification of demand for services concerning cloud network, regulatory demands, there arise a requirement for a semi to fullyautomated self sovereign identity (SSI) implementation to minimize cost. A cryptographic method for data migration in a secured manner to and from thecloud network utilizing self sovereignty identity was implemented in [11]. With the involvement SSI peer-to-peer transactions, presence of TPA was no longer required, therefore reducing the cost.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…With the immense magnification of demand for services concerning cloud network, regulatory demands, there arise a requirement for a semi to fullyautomated self sovereign identity (SSI) implementation to minimize cost. A cryptographic method for data migration in a secured manner to and from thecloud network utilizing self sovereignty identity was implemented in [11]. With the involvement SSI peer-to-peer transactions, presence of TPA was no longer required, therefore reducing the cost.…”
Section: Related Workmentioning
confidence: 99%
“…This is mathematically expressed as given below. (11) Given the ciphertext ' ', on the other hand, the sender's identity ' '…”
Section: Multi-linear Mappingmentioning
confidence: 99%
“…Users store their identity data locally on the device and provide the required information to those who need it for verification. With the development of blockchains [4,5], blockchain-based SSI authentication protocols [6][7][8][9][10]were proposed recently. In 2018, Gra ¨ther et al [6] applied blockchain-based SSI to education certificate management to prevent education certificate forgery; Soltani et al [7] proposed a selfsovereign identity model for users onboarding on blockchain.…”
Section: Introductionmentioning
confidence: 99%
“…In 2018, Gra ¨ther et al [6] applied blockchain-based SSI to education certificate management to prevent education certificate forgery; Soltani et al [7] proposed a selfsovereign identity model for users onboarding on blockchain. In 2021, Abraham et al [8] introduced a SSI model utilizing identity wallets to ensure that the identity data control remains with the related user; Aruna et al [9] used a secure data migration to and from the cloud using SSI which facilitates peer-to-peer transactions; Figueroa-Lorenzo et al [10] presented a solution based on self-sovereign identity on hyperledger fabric blockchain. However, these current SSI authentication protocols pay little attention to privacy protection and the fine-grained access control of identity information.…”
Section: Introductionmentioning
confidence: 99%
“…Each period of the data development interaction ought to be gotten, similar to data exposure, portrayal, and ordering of permission to the essential data. Appropriated capacity organizations are brought together [7] [8]. part in data movement plans and ought not to disregard orders.…”
Section: Introductionmentioning
confidence: 99%