International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064


Downloads: 99

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 3 Issue 11, November 2014


Multilayered Security Approach for Cloud Data Centers using Hash Functions

Jashanpreet Pal Kaur, Rajbhupinder Kaur


Abstract: Cloud Computing provides computing over the internet. The cloud is not a trust worthy because there is no control of users on the data. Hence, the cloud data centers are vulnerable to assorted attacks. It is required for the cloud service providers to ensure the secured data transmission in the cloud framework. There is also dependency among the layers. So attack at any layer may affect the other layers. This paper proposed a new multilayered security approach means the security at different levels of different cloud layers to secure the data stored at cloud data centers based on dynamic hybrid key then performance of proposed algorithm is evaluated at last based on execution time, security improvement percentage and delay.


Keywords: Security Issues in Cloud computing, Cryptography, MD5 and SHA1 Algorithms, Static and Dynamic Keys


Edition: Volume 3 Issue 11, November 2014,


Pages: 2394 - 2397


How to Cite this Article?

Jashanpreet Pal Kaur, Rajbhupinder Kaur, "Multilayered Security Approach for Cloud Data Centers using Hash Functions", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=OCT14768, Volume 3 Issue 11, November 2014, 2394 - 2397

How to Share this Article?

Enter Your Email Address


Similar Articles with Keyword 'Cryptography'

Downloads: 117 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Similar Articles with Keyword 'Security'

Downloads: 117 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Downloads: 134

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar, Mohan K

Share this Article

Similar Articles with Keyword 'Issues'

Downloads: 1

Research Paper, Computer Science & Engineering, Russia, Volume 10 Issue 4, April 2021

Pages: 1115 - 1121

Conceptual Modeling of a Tramcar

Iftikhar B. Abbasov, Viacheslav V. Orekhov

Share this Article

Downloads: 2 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 10, October 2021

Pages: 214 - 218

A Recognition System for Handwritten Digits Using CNN

Ayesha Siddiqa, Chakrapani D S

Share this Article

Similar Articles with Keyword 'Cloud'

Downloads: 180

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

Downloads: 1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 9, September 2021

Pages: 939 - 945

Load Balancing in Cloud Computing Using Optimization Algorithm

Manpreet Kaur, Dr. Amandeep Kaur

Share this Article

Similar Articles with Keyword 'computing'

Downloads: 180

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

Downloads: 1

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1884 - 1886

Performance Analysis of Clustal W Algorithm on Linux Cluster

Swati Jasrotia, Salam Din

Share this Article
Top