2013
DOI: 10.5120/11644-7133
|View full text |Cite
|
Sign up to set email alerts
|

Security in Cloud Computing- Hash Function

Abstract: There is a critical need to securely store, manage, share and analyze massive amounts of complex (e.g., semi-structure and unstructured) data to determine patterns and trends in order to improve the quality of healthcare, better safeguard the nation and explore alternative energy. Because of the critical nature of the applications, it is important that clouds be secure. The major security challenge with clouds is that the owner of the data may not have control of where the data is placed. This is because if on… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 10 publications
0
1
0
Order By: Relevance
“…In the following sections we put special focus on hash functions and security issues imposed by their integration over cloud. There are many ways in which a hash code can be used to provide message authentication in cloud systems [9]: (i) Encrypt message plus hash code; (ii) Encrypt hash code-shared secret key; (iii) Encrypt hash code-sender's private key; (iv) Compute hash code of message plus secret value; (v) Confidentiality with encrypting the entire message plus the hash code. Thus, any flaw or weakness in standard or popular hash algorithms affects the safety of data stored in cloud.…”
Section: Meco -2015 Budva Montenegromentioning
confidence: 99%
“…In the following sections we put special focus on hash functions and security issues imposed by their integration over cloud. There are many ways in which a hash code can be used to provide message authentication in cloud systems [9]: (i) Encrypt message plus hash code; (ii) Encrypt hash code-shared secret key; (iii) Encrypt hash code-sender's private key; (iv) Compute hash code of message plus secret value; (v) Confidentiality with encrypting the entire message plus the hash code. Thus, any flaw or weakness in standard or popular hash algorithms affects the safety of data stored in cloud.…”
Section: Meco -2015 Budva Montenegromentioning
confidence: 99%