Security based Approach of SHA 384 and SHA 512 Algorithms in Cloud Environment
- 1 D. G. Vaishnav College, India
Cloud computing is going to be the next big thing in the era of internet world. As the world moves ahead towards enhancement of the cloud features we also have to take a serious consideration of the enhancing cloud securities to protect the end-user’s data. The major usage of this cloud feature are widely applied in the cloud based IT sector for operation advancement, Data storage; on-demand software delivery and many more operations which also requires the scrutiny of the data that is being shared. This research work is carried out to enhance the security of the end-users using secured hashing algorithm. In this, the principles of hash utility are applied that makes the intruders difficult to decode the encrypted password of the user. Even if the intruder or even the administrator of the server tries to decode the encryption for multiple attempts to decode the password the hash codes of the server keeps on changing for multiple attempts. This research work gives a new solution for the concern that is getting raised on the data privacy. The usage of the secured hashing algorithm helps to develop platform that ensure data security for the end-user in the cloud environment. For that the Secure Hashing Algorithm (SHA) 384& SHA 512 is taken and implemented by a practical approach in cloud. For the implementation of these two algorithms, the major attacks faced by end user namely Brute force attack, Man in Middle attack and Rainbow attack are experimented under cloud platform. From the experimental results, it is identified that the best algorithm to protect the data.
Copyright: © 2020 Thambusamy Velmurugan and Sivakumar Karthiga. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
- 2,241 Views
- 2,237 Downloads
- 2 Citations
- Network Security
- Hash Technique
- Secure Hashing Algorithm 384
- Secure Hashing Algorithm 512