Loading…

A Trustworthy Framework for Multi-Cloud Service Management: Self-Sovereign Identity Integration

Self-Sovereign-Identity (SSI) technologies based on blockchain networks (BCNs) are increasingly used in various industries, including telecommunications. To address the strict governance of telecommunication infrastructure, we propose a decentralized architecture based on BCN and BCN-based SSI for n...

Full description

Saved in:
Bibliographic Details
Published in:IEEE transactions on network science and engineering 2024-05, Vol.11 (3), p.3135-3147
Main Authors: Zeydan, Engin, Baranda, Jorge, Mangues-Bafalluy, Josep, Arslan, Suayb S., Turk, Yekta
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Self-Sovereign-Identity (SSI) technologies based on blockchain networks (BCNs) are increasingly used in various industries, including telecommunications. To address the strict governance of telecommunication infrastructure, we propose a decentralized architecture based on BCN and BCN-based SSI for network management and orchestration to fully involve multiple entities in the management. The proposed solution aims to provide a trusted environment for Cloud Service Providers (CSPs), Vertical Service Providers (SPs) and Mobile Network Operators (MNOs) to manage the lifecycle of network services (such as instantiation, scaling, termination) in a multi-cloud environment. The identity authentication mechanism ensures control of permissions and cross-entity collaboration. The proposed approach is validated through an experimental scenario using Hyperledger Indy and Quorum BCN to measure various performance metrics related to service orchestrator (SO)-related instantiation and SSI credential verification metrics to to ensure improved feasibility, scalability, reliability, and performance. Our evaluation results show that the average time for writing data to the BCN is on the order of seconds, while the average times for different credential operations range from milliseconds to several hundred milliseconds, indicating that these operations are accomplished within shorter timeframes in the implemented system. We also provide recommendations for optimizing the system and address some observed challenges.
ISSN:2327-4697
2334-329X
DOI:10.1109/TNSE.2024.3361809