CFP last date
22 April 2024
Reseach Article

Hybrid Encryption based SHA2-256 Integration Techniques for High Security for Data Stored in Cloud Environment

by Keerti Verma, Sreeja Nair
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 168 - Number 1
Year of Publication: 2017
Authors: Keerti Verma, Sreeja Nair
10.5120/ijca2017914267

Keerti Verma, Sreeja Nair . Hybrid Encryption based SHA2-256 Integration Techniques for High Security for Data Stored in Cloud Environment. International Journal of Computer Applications. 168, 1 ( Jun 2017), 24-28. DOI=10.5120/ijca2017914267

@article{ 10.5120/ijca2017914267,
author = { Keerti Verma, Sreeja Nair },
title = { Hybrid Encryption based SHA2-256 Integration Techniques for High Security for Data Stored in Cloud Environment },
journal = { International Journal of Computer Applications },
issue_date = { Jun 2017 },
volume = { 168 },
number = { 1 },
month = { Jun },
year = { 2017 },
issn = { 0975-8887 },
pages = { 24-28 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume168/number1/27839-2017914267/ },
doi = { 10.5120/ijca2017914267 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:14:58.339538+05:30
%A Keerti Verma
%A Sreeja Nair
%T Hybrid Encryption based SHA2-256 Integration Techniques for High Security for Data Stored in Cloud Environment
%J International Journal of Computer Applications
%@ 0975-8887
%V 168
%N 1
%P 24-28
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud Computing is the pool of shared resources provided to the user by the Cloud service providers. Many software or application programs are made available to the user at low cost and the deployment environment also provided by the third party cloud providers which are having a full control over the application settings. Since user has no control on the settings of application programs there is always be trust and security issues. The data on the remote cloud server is not secure as a large amount of data is moving to and fro between large number of authorized and unauthorized users. The data can be easily modified by the intruders in the public deployment environment. Thus the using of security algorithms like makes it easier for the security of data to user.

References
  1. Karandeep Kaur, “A Review of Cloud Computing Service Models," International Journal of Computer Applications (0975 – 8887), Volume 140 – No.7, April 2016.
  2. M. Chandni Jain," Cloud Computing: Network/Security Threats and Counter measures," international Journal of Advanced Research in Computer and Communication Engineering Vol. 4, Issue 8, August 2015.
  3. Roman Nedzelský,"Hybrid Cloud Computing: Security Aspects and Challenges," 2016.
  4. Imran Ashraf, “An Overview of Service Models of Cloud Computing," International Journal of Multidisciplinary and Current Research, July/Aug 2014.
  5. Dimpi Rani and Rajiv Kumar Ranjan," A Comparative Study of SaaS, PaaS and IaaS in Cloud Computing," International Journal of Advanced Research in Computer Science and Software Engineering," Volume 4, Issue 6, June 2014.
  6. Polshetwar Poonam and Saad Siddiqui," Comparison of Cloud Computing Service Models: SaaS, PaaS, IaaS," International Journal & Magazine of Engineering, Technology, Management and Research, Volume No: 1(2014), Issue No: 11 (November).
  7. Diogo A. B. Fernandes, Liliana F. B. Soares, Jo~ao V. Gomes, M´ario M. Freire and Pedro R. M. In´acio," Security Issues in Cloud Environments | A Survey," International Journal of Information Security (IJIS, 2013.
  8. Ms. Disha H. Parekh and Dr. R. Sridaran,"An Analysis of Security Challenges in Cloud Computing," (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 4, No.1, 2013.
  9. Abhinay B.Angadi, Akshata B.Angadi and Karuna C.Gull," Security Issues with Possible Solutions in Cloud Computing-A Survey," International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 2, February 2013.
  10. Dr. Nandita Sengupta,"Designing of Hybrid RSA Encryption Algorithm for Cloud Security, “International Journal of Innovative Research in Computer and Communication Engineering, Vol. 3, Issue 5, May 2015.
  11. Abha Sachdev and Mohit Bhansali," Enhancing Cloud Computing Security using AES Algorithm," International Journal of Computer Applications (0975 – 8887) Volume 67– No.9, April 2013.
  12. Garima Saini and Naveen Sharma," Triple Security of Data in Cloud Computing," International Journal of Computer Science and Information Technologies, Vol. 5 (4), 2014.
  13. Rachna Arora and Anshu Parashar," Secure User Data in Cloud Computing Using Encryption Algorithms," International Journal of Engineering Research and Applications (IJERA), Vol. 3, Issue 4, Jul-Aug 2013.
  14. Deepika Verma and Er. Karan Mahajan," To Enhance Data Security in Cloud Computing using Combination of Encryption Algorithm," International Journal of Advances in Science and Technology (IJAST), Vol 2, Issue 4 (December 2014).
  15. Aized Amin Soofi, M. Irfan Khan and Fazal-e- Amin,"Encryption Techniques for Cloud Data Confedentiality," IJGDC, Vol. 7, No. 4, 2014.
  16. V.Masthanamma and G.Lakshmi Preya," An Efficient Data Security in Cloud Computing Using the RSA Encryption Process Algorithm," International Journal of Innovative Research in Science, Engineering and Technology, Vol. 4, Issue 3, March 2015.
  17. Parsi Kalpana and Sudha Singaraju," Data Security in Cloud Computing using RSA Algorithm," Parsi Kalpana, et al, International Journal of Research in Computer and Communication technology, IJRCCT, ISSN 2278-5841, Vol 1, Issue 4, September 2012.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Data Security integrity.