CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Security in Cloud Computing- Hash Function

by Paridhi Singhal, Alok Garg, Manoj Diwakar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 68 - Number 14
Year of Publication: 2013
Authors: Paridhi Singhal, Alok Garg, Manoj Diwakar
10.5120/11644-7133

Paridhi Singhal, Alok Garg, Manoj Diwakar . Security in Cloud Computing- Hash Function. International Journal of Computer Applications. 68, 14 ( April 2013), 1-5. DOI=10.5120/11644-7133

@article{ 10.5120/11644-7133,
author = { Paridhi Singhal, Alok Garg, Manoj Diwakar },
title = { Security in Cloud Computing- Hash Function },
journal = { International Journal of Computer Applications },
issue_date = { April 2013 },
volume = { 68 },
number = { 14 },
month = { April },
year = { 2013 },
issn = { 0975-8887 },
pages = { 1-5 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume68/number14/11644-7133/ },
doi = { 10.5120/11644-7133 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:27:47.725756+05:30
%A Paridhi Singhal
%A Alok Garg
%A Manoj Diwakar
%T Security in Cloud Computing- Hash Function
%J International Journal of Computer Applications
%@ 0975-8887
%V 68
%N 14
%P 1-5
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

There is a critical need to securely store, manage, share and analyze massive amounts of complex (e. g. , semi-structure and unstructured) data to determine patterns and trends in order to improve the quality of healthcare, better safeguard the nation and explore alternative energy. Because of the critical nature of the applications, it is important that clouds be secure. The major security challenge with clouds is that the owner of the data may not have control of where the data is placed. This is because if one wants to exploit the benefits of using cloud computing, one must also utilize the resource allocation and scheduling provided by clouds. Therefore we need to safeguard the data in the midst of entrusted processes. In this method some important security services including authentication, encryption and decryption are provided in Cloud Computing system.

References
  1. Shucheng Yu. , Cong Wang†, Kui Ren†, Wenjing Lou. , "Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing", IEEE Communications Society for publication in the IEEE INFOCOM 2010.
  2. Loud Security Alliance, "Security guidance for critical areas of focus in cloud computing", 9, [Online] Available: http:// www. cloudsecurityalliance. org.
  3. Abhishek Parakh, Subhash Kak, "Online data storage using implicit security", 2009.
  4. A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, M. Zaharia, "Above the clouds: A berkeley view of cloud computing", University of California, Berkeley, Tech. Rep, 2009.
  5. Qian Wang, Cong Wang, Kui Ren, Wenjing Lou, Jin Li, "Toward Publicly Auditable Secure Cloud Data Storage Services", IEEE Network, 2010.
  6. Hongwei Li, Yuanshun Dai, Ling Tian, Haomiao Yang, "Identity-Based Authentication for Cloud Computing", CloudCom 2009, LNCS 5931, pp. 157–166, 2009.
  7. Qian Wang, Cong Wang, Kui Ren, Wenjing Lou, Jin Li ,"Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing", IEEE Transactions On Parallel And Distributed Systems, Vol. 22, No. 5, 2011.
  8. H. Shacham, B. Waters, "Compact proofs of retrievability", in Proc. of ASIACRYPT 2008, vol. 5350, pp. 90–107,
  9. S. Sajithabanu, Dr. E. George Prakash Raj, "Data Storage Security in Cloud", IJCST Vol. 2, Issue 4, Oct. - Dec. 2011
  10. Cong Wang, Qian Wang, Kui Ren, Wenjing Lou, "Privacy Preserving Public Auditing for Data Storage Security in Cloud Computing", 2010.
  11. Tsudik, G. "Message Authentication with One-Way Hash Functions", Proceedings, INFOCOM'92, May 1992.
  12. Ramgovind, S. Eloff and M. M. Smith, E. ,"The management of security in Cloud computing", in Information Security for South Asia (ISSA), 2010, pp. 1-7.
  13. Pardeep Kumar, Vivek Kumar Sehgal, Durg Singh Chauhan, P. K. Gupta, Manoj Diwakar, "Effective Ways of Secure, Private and Trusted Cloud Computing", IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 3, No. 2, 2011.
Index Terms

Computer Science
Information Sciences

Keywords

Security Credentials Data Encryption Authentication Hash Function