Cloud Computing – Key Hashing Cryptographic Implication based Algorithm for Service Provider based Encryption and Decryption

International Journal of Computer Trends and Technology (IJCTT)          
© 2017 by IJCTT Journal
Volume-49 Number-4
Year of Publication : 2017
Authors : D. Ramesh, Dr. B, Rama


D. Ramesh, Dr. B, Rama "Cloud Computing – Key Hashing Cryptographic Implication based Algorithm for Service Provider based Encryption and Decryption". International Journal of Computer Trends and Technology (IJCTT) V49(4):246-252, July 2017. ISSN:2231-2803. Published by Seventh Sense Research Group.

Abstract -
The cloud computing data storage and retrieval based service providers are representing the client environmental based encryption techniques to avoid and restrict the unauthorized access along with privacy of the data, it provides the services of high securable data delivery and flexible data storage. The main role of encryption is to provide the provision to protect the sensitive data and play the key role for business developments. The main problem will be raised when the system will maintain the ownership control and to present the latest set of technical and business concerns. Many complex problems and challenges are waiting for the optimistic solutions, some of the problems, such as in the structured storage based environment, the provision of encryption environment for the data when it preserve self-ability to access the key elements along with their files which necessitate belonging to the plaintext; the data owners must maintain the privacy based control over their own data to make certain inclusive service based functionalities; and the data owners will face difficult to control their own data which available in cloud and their cloud based internal services such as type of data based topology architecture along with their functionalities, related security active models for employ the data security within their schemes and organizational services along with the encrypted based data access control. To overcome theses in convinces this paper is proposing the technical ideal through the algorithmic methodology along the graphical flow architecture. This paper is proposing the key hashing based cryptographic algorithmic flow chart implications and hashing algorithm techniques for service provider encryption and decryption end pointing mechanism to reduce the above mention complex difficulties; it describes the primary encryption based techniques and various levels of cryptographic algorithms with their implications. And also it has expressed how the hash functions can be extended in cloud based data security and digital forensics based applications.

[1] Gutman, P., Naccache, D., & Palmer, C.C. (2005, May/June). When hashes collide. IEEE Security & Privacy, 3(3), 68-71.
[2] CLOUD SECURITY ALLIANCE, SecaaS Implementation Guidance, Category 8: Encryption, September 2012,,
[3] Cryptography, in an all encrypted world charting the future of innovation volume 92 | #10· 2015 december 22, 2015, Ericsson Technology Review cryptography in an all Encrypted World Security in the post-snowd
[4] Fraunhofer Institute for Secure Information Technology. (2012, March). On the Security of Cloud Storage Services. Retrieved from
[5] Vaultive Encryption in Use Platform, Taking Control of Cloud Data: A Realistic Approach to Encryption of Cloud Data in Use, Vaultive Inc. 489 5th Ave, 31st Fl.New York, NY 10017.
[6] Gary C. Kessler , An Overview of Cryptography, Handbook on Local Area Networks (Auerbach, Sept. 1998).
[7] Blum, D. (2010, March). Using Encryption to Protect Sensitive Data in Cloud Computing Environments, Retrieved from Gartner database.
[8] Burr, W. (2006, March/April). Cryptographic hash standards: Where do we go from here? IEEE Security & Privacy, 4(2), 88-91.
[9] European Network and Information Security Agency (ENISA). (2009). Cloud Computing benefits, risks, and recommendations for information security. Retrieved from
[11] ACE WG, 2015, Object Security of CoAP (OSCOAP), available at:
[12] Gigaom Research, 2014, Data privacy and security in the post-snowden era, available at: HTTP://WWW.VERNEGLOBAL.COM/SITES/DEFAULT/FILES/GIGAOM_RESEARCH-DATA_PRIVACY_AND_SECURITY.PDF
[13] PERC, 2015, Secure Real-time Transport Protocol (SRTP) for Cloud Services, available at:
[14] Proceedings of the 23rd ACM, 2011, CryptDB: Protecting confidentiality with encrypted query processing, abstract available at:
[15] Ericsson, 2015, Encryption Performance Improvements of the Paillier Cryptosystem, available at:
[16] Mell, Peter and Tim Grace. Draft NIST Working Definition of Cloud Computing, Available at -def-v15.doc, on August 28, 2009.
[17] Prasanna B.T, C.B. Akki, A Survey on Homomorphic and Searchable Encryption Security Algorithms for Cloud Computing. Communicated to Journal of Interconnection Networks, April 2014.
[18] Prasanna B T, C B Akki, “A Comparative Study of Homomorphic and Searchable Encryption Schemes for Cloud Computing”.
[19] Qiang Huang and Jazib Frahim, SSL VPN Technology, Network World | Oct 22, 2008
[20] AccessData. (2006, April). MD5 Collisions: The Effect on Computer Forensics. AccessData White Paper.
[21] Dwyer, D. (2009, June 3). SHA-1 Collision Attacks Now 252. SecureWorks Research blog.
[22] Klima, V. (March 2005). Finding MD5 Collisions - a Toy for a Notebook.
[23] Lee, R. (2009, January 7). Law Is Not A Science: Admissibility of Computer Evidence and MD5 Hashes. SANS Computer Forensics blog.

Encryption based Integrity (EbI), Key-Logging Facility (KLF), Cloud based Service Providers (CbSP), Information based Security (IbS), single mode encryption (SME), Application based Desired Plain Text (AbDPT), Application based Other Plain Text (AbOPT), pure-plaintext (PPT), pure-ciphertext (PCT), Fixed-Length-Sliding Window (FLSW), Message-Digest-Algorithm-5 (MD5), Secure-Hash-Algorithm-1 (SHA-1).