Multilayered Security Approach for Cloud Data Centers using Hash Functions
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Views: 141 , Downloads: 99 | CTR: 70 % | Weekly Hits: ⮙4

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 3 Issue 11, November 2014

Multilayered Security Approach for Cloud Data Centers using Hash Functions

Jashanpreet Pal Kaur, Rajbhupinder Kaur

Cloud Computing provides computing over the internet. The cloud is not a trust worthy because there is no control of users on the data. Hence, the cloud data centers are vulnerable to assorted attacks. It is required for the cloud service providers to ensure the secured data transmission in the cloud framework. There is also dependency among the layers. So attack at any layer may affect the other layers. This paper proposed a new multilayered security approach means the security at different levels of different cloud layers to secure the data stored at cloud data centers based on dynamic hybrid key then performance of proposed algorithm is evaluated at last based on execution time, security improvement percentage and delay.

Keywords: Security Issues in Cloud computing, Cryptography, MD5 and SHA1 Algorithms, Static and Dynamic Keys

Edition: Volume 3 Issue 11, November 2014

Pages: 2394 - 2397

Share this Article

How to Cite this Article?

Jashanpreet Pal Kaur, Rajbhupinder Kaur, "Multilayered Security Approach for Cloud Data Centers using Hash Functions", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=OCT14768, Volume 3 Issue 11, November 2014, 2394 - 2397

141 PDF Views | 99 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Cryptography'

Views: 7 , Downloads: 3 | CTR: 43 % | Weekly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021

Pages: 788 - 791

A New Cryptography Algorithm Based on ASCII Code

Yaser M.A. Abualkas

Share this Article

Views: 159 , Downloads: 90 | CTR: 57 % | Weekly Hits: ⮙4

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1057 - 1058

Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS

Pranita Prakash Kulkarni

Share this Article

Views: 170 , Downloads: 93 | CTR: 55 % | Weekly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

Views: 141 , Downloads: 99 | CTR: 70 % | Weekly Hits: ⮙4

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2394 - 2397

Multilayered Security Approach for Cloud Data Centers using Hash Functions

Jashanpreet Pal Kaur, Rajbhupinder Kaur

Share this Article

Views: 135 , Downloads: 99 | CTR: 73 % | Weekly Hits: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1200 - 1203

Efficient Hardware Encryption Using Lightweight Process

Deeksha Bhardwaj, Rohit Pawar, Aman Jain

Share this Article
Top