A Survey of Cryptographic Hash Function (SHA) in Cloud Storage

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2019 by IJCTT Journal
Volume-67 Issue-5
Year of Publication : 2019
Authors : Dr. C D Guruprakash, Mr. Subhash C S
DOI :  10.14445/22312803/IJCTT-V67I5P123

MLA

MLA Style:Dr. C D Guruprakash, Mr. Subhash C S"A Survey of Cryptographic Hash Function (SHA) in Cloud Storage" International Journal of Computer Trends and Technology 67.5 (2019):136-140.

APA Style: Dr. C D Guruprakash, Mr. Subhash C S (2019) A Survey of Cryptographic Hash Function (SHA) in Cloud Storage International Journal of Computer Trends and Technology, 67(5), 136-140.

Abstract
The cloud computing has become phenomena its consider to be revolution in information technology, the cloud encompasses elements from grid computing, utility computing and autonomic computing, into an innovative deployment architecture, Cloud computing offering easy access and high performance computing and storage infrastructure using web service. This rapid movement towards the clouds has impact in level of security the real interesting question is how to build secure cloud storage where service provider is not completely trust customer. In this paper a comprehensive survey of existing literature for cryptographic storage techniques, benefits and drawbacks in cloud computing is presented.

Reference
[1] Sandip S. Dabre1 , Mangesh S. Shegokar2, " Mechanism for secure Big data stored within cloud storage by using cloud computing (Secure cloud storage)" , International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 4 April 2015, Page No. 11306-11309
[2] Mahima, Yudhveer, " Secure Cloud Storage ",International Journal of Computer Science & Communication Networks,Vol 1(2), 171-175 [3] Kamara and Lauter: A Searchable, "ryptographic Cloud Storage System", International Scholarly and Scientific Research & Innovation 7(8) 2013.
[3] Luan, Shang-Wen, et al. "Development of a smart power meter for AMI based on ZigBee communication", Power Electronics and Drive Systems, 2009. PEDS 2009. International Conference on. IEEE, 2009.
[4] G. Ateniese, S. Kamara, and J. Katz. ?Proofs of storage from homomorphic identification protocols?. In Advances in Cryptology - ASIACRYPT `09, volume 5912 of Lecture Notes in Computer Science, pages 319{333. Springer, 2012}.
[5] Yogeswararao Gairaboina1, Y. Siva Prasad2, " A Trusted Cryptography Key Framework for User Data Storage in Cloud Environment", International Journal of Science and Research (IJSR) ISSN (Online): 2319- 7064 Impact Factor (2012): 3.358
[6] Alowolodu O.D, Alese B.K, " Elliptic Curve Cryptography for Securing Cloud Computing Applications " , International Journal of Computer Applications (0975 – 8887) Volume 66– No.23, March 2013
[7] Nesrine K aaniche , Aymen Boudguiga, Maryline aurent, " ID -Based Cryptography for Secure Cloud Data Storage", IEEE sixth international conference 2013 Page(s):375 - 382
[8] G. Clarke, Microsoft`s Azure Cloud Suffers First Crash, The Register, March 16, 2009, [online]. http://www.theregister.co.uk/
[9] Hassan Takabi , James B.D. Joshi, Gail Joon Ahn, ?Cloud Computing Security and Privacy Challenges in Cloud Computing Environments ", Copublished By The Ieee Computer And Reliability Societies,1540-7993/10/$26.00 © 2010 IEEE.
[10] Australian government department of defense, "Cloud Computing Security Considerations", Cyber Security Operations Centre April 2011, Updated September 2012.
[11] Seny Kamara, " Cryptographic Cloud storage", proceedings of Financial Cryptography: Workshop on Real-Life Cryptographic Protocols and Standardization 2010 [12] Rohit S. Bhore, Sejal B. Bharkhada, Ashwini N. Malik, Prof. Anuja K Pande, " Cryptographic Cloud Storage & Networking ", International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 12, December 2013 ISSN: 2277 128X Available online at: www.ijarcsse.com
[12] The Cointelegraph, A Brief History of Ethereum From Vitalik
[13] D. Boneh, E. Kushilevitz, R. Ostrovsky, and W. Skeith. ?Publickey encryption that allows PIR queries?, In A. Menezes, editor, Advances in Cryptology - CRYPTO `07, volume 4622 of Lecture Notes in Computer Science, pages 50-67. Springer, 2007.
[14] Akansha Deshmukh, Harneet Kaur Janda, Sayalee Bhusari, "Security on Cloud Using Cryptography", International Journal of Advanced Research in Computer Science and Software Engineering, Volume 5, Issue 3, March 2015 ISSN: 2277 128X Available online at: www.ijarcsse.com
[15] Jean-Jacques Quisquater, How to Explain Zero-Knowledge Protocols to Your Children, 1989.
[16] Akansha Deshmukh, Harneet Kaur Janda, Sayalee Bhusari, "SecurityonCloudUsingCryptography",InternationalJournalofAdvancedResearchinComputerScienceandSoftwareEngineering,Volume5,Issue3,March2015ISSN:2277128XAvailableonlineat:www.ijarcsse.com
[17] JamesMark Kelly, Columbusstate University CPSC 6128 Spring 2010-Cloud computing and cryptography
[18] Neha Jainand Gurpreet Kaur „?Implementing DES algorithmin Cloud for Data Security? VSRD.
[19] Rashmi Nigoti1, Manoj Jhuria2 Dr.Shailendra Singh3, " A Survey of Cryptographic Algorithms for Cloud Computing ", International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS) Available online at: www.iasir.net
[20] G. Murugaboopathi, C.Chandravathy, P. Vinoth Kumar, " Study on Cloud Computing and Security Approaches", International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-3, Issue-1, March 2013
[21] Sana Belguith, Abderrazak Jemai, Rabah Attia, " Enhancing Data Security in Cloud Computing Using a Lightweight Cryptographic Algorithm ", ICAS 2015 : The Eleventh International Conference on Autonomic and Autonomous Systems.
[22] Evan Duffield,Daniel Diaz ,Dash: ?A Privacy-Centric Crypto-Currency?, 2015.
[23] D. Zissis and D. Lekkas. ?Addressing cloud computing security issues?. Future Generation Computer Systems, 28(3), 2012, pp. 583-592 [22]Cloud Security Alliance. Top threats to cloud computing, Cloud Security Alliance, 2010
[24] Seny Kamara,, Kristin Lauter, "Cryptographic Cloud Storage", Financial Cryptography and Data Security ? Volume 6054 ,2010, pp 136-149
[25] Richard Chow, Philippe Golle, Markus Jakobsson, Elaine Shi, Jessica Staddon, Ryusuke Masuoka, and Jesus Molina. ?Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control?. In Proceedings of the 2009 ACM workshop on Cloud computing security, CCSW ?09, pages 85–90, New York, NY, USA, 2009. ACM

Keywords
cloud computing, cloud storage, cryptographic storage architecture.