2015 4th Mediterranean Conference on Embedded Computing (MECO) 2015
DOI: 10.1109/meco.2015.7181879
|View full text |Cite
|
Sign up to set email alerts
|

Security challenges of integration of hash functions into cloud systems

Abstract: Cloud Computing is a new paradigm for the IT industry. IT services such as infrastructures, platforms and applications are provided remotely, over the Internet, and all resources are virtualized. Challenges about confidentiality, integrity, authenticity, and nonrepudiation are still opened representing the main concerns that reduces the growth of cloud computing. Hash based mechanisms are thus mainly used for message authentication and this paper analyses imposed security issues over clouds. To this end, recen… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0
1

Year Published

2017
2017
2017
2017

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 26 publications
0
0
0
1
Order By: Relevance
“…Trabaja en bloques de 512 bits que provienen de usar 8 palabras de 64 bits, las que a su vez entregan 3 palabras de 64 bits. Esto genera una cadena final de 192 bits [18].…”
Section: Funciones Resumenunclassified
“…Trabaja en bloques de 512 bits que provienen de usar 8 palabras de 64 bits, las que a su vez entregan 3 palabras de 64 bits. Esto genera una cadena final de 192 bits [18].…”
Section: Funciones Resumenunclassified