Abstract

Cloud computing is going to be the next big thing in the era of internet world. As the world moves ahead towards enhancement of the cloud features we also have to take a serious consideration of the enhancing cloud securities to protect the end-user’s data. The major usage of this cloud feature are widely applied in the cloud based IT sector for operation advancement, Data storage; on-demand software delivery and many more operations which also requires the scrutiny of the data that is being shared. This research work is carried out to enhance the security of the end-users using secured hashing algorithm. In this, the principles of hash utility are applied that makes the intruders difficult to decode the encrypted password of the user. Even if the intruder or even the administrator of the server tries to decode the encryption for multiple attempts to decode the password the hash codes of the server keeps on changing for multiple attempts. This research work gives a new solution for the concern that is getting raised on the data privacy. The usage of the secured hashing algorithm helps to develop platform that ensure data security for the end-user in the cloud environment. For that the Secure Hashing Algorithm (SHA) 384& SHA 512 is taken and implemented by a practical approach in cloud. For the implementation of these two algorithms, the major attacks faced by end user namely Brute force attack, Man in Middle attack and Rainbow attack are experimented under cloud platform. From the experimental results, it is identified that the best algorithm to protect the data.

Highlights

  • Cloud computing is extensively preferred platform across management

  • SHA 1 & SHA 2 is the base of Secure Hashing Algorithm 256& 384& 512 and Message Digest

  • The directory of user can be downloaded at any moment from the cloud locker and compute hash value can be balanced with the hash value stored in archive

Read more

Summary

Introduction

Cloud computing is extensively preferred platform across management. The fluid data swap and the leisure of 24*7 approach to data admittance firms to engage frequently. The provider must secure their framework is defended and their consumer data and utilization are guaranteed, while the end user must yield allotment to protect their application and use tough password and testimonial dimension (Vouk, 2008). Sun et al (2011) canvass about Cloud service distributors must protect that through attainment audit are control for apprentice who have physical path to the servers and the data center in its survey paper. There is a prospect that one user’s infantry data can be discern by alternative customer. To crank such tricky position, cloud service providers should assure decent data confinement and coherent storage segregation in its cloud computing research paper

Methods
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call