Comparative Analysis of Hash Authentication Algorithms and ECC Based Security Algorithms in Cloud DataAuthor : S. Hendry Leo Kanickam and L. Jayasimman
Volume 8 No.1 January-March 2019 pp 53-61
Cloud computing is ensuring the security of stored data in cloud computing servers is one of the mainly demanding issues. In Cloud numerous security issues arises such as authentication, integrity and confidentiality. Different encryption techniques attempt to overcome these data security issues to an enormous extent. Hashing algorithm plays an important role in data integrity, message authentication, and digital signature in modern information security. For security purpose using encryption algorithm like ECC (Elliptic Curve Cryptography) and Authentication of data integrity using hashing algorithms like MD5, and SHA-512. This combination method provides data security, authentication and verification for secure cloud computing.
Cloud Computing, Hash Algorithm, Elliptic Curve Cryptography, MD5, SHA, ECDH, ECDSA
 Yashapalkadam,: Security in cloud Computing A Transparent View”, International Journal of Computer Science Emerging Technology,Vol. 2,pp.316-322. October 2011.
 P.Metri and G.Sarote, “Privacy Issues and Challenges in Cloud Computing”, International Journal of Advanced Engineering Science and Technologies, No. 5,pp.1-6,2013.
 R.Buyya, C.S.Yeo, S.Venugopal, “Cloud Computing and emerging IT platforms: vision, hype and reality for delivering
 computing as 5th utility”, Future Generation Computer System, Vol. 25, pp.599-616, 2009.
 S. S. Chow, C.-K. Chu, X. Huang, J. Zhou, and R. H. Deng, “Dynamic secure cloud storage with provenance,” in Cryptography and Security: From Theory to Applications, Springer, pp. 442–464. 2012.
 E. M. Mohamed, H. S. Abdelkader, and S. El-Etriby, “Enhanced data security model for cloud computing,” in Informatics and Systems (INFOS), 2012 8th International Conference on IEEE, pp.12-16. 2012.
 M.A. Al-Ahmad and I.F. Alshaikhli “Broad View of Cryptographic Hash Functions”, International Journal of Computer Science Issues journal (ISI Journal), Vol. 10, No. 4,pp.102-108, 2013.
 A. Al-Vahed, and Sahhavi, “An overview of modern cryptography, World Applied Programming, Vol. 1, No. 1,pp.55-61, 2011.
 A. Apostul, F. Pulcan, G. Ularu, G. Suciu and G. Todoran, “Study on advantages and disadvantages of Cloud’, International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 2, No. 11,pp. 200-205, 2013.
 M. Armbrust, A. Fox, R. Griffith, A. Joseph, R. Katz, R. Konwinski, G. Lee, D. Patterson, A. Rabkin, L. Stoica, and M. Zaharia . “A View of Cloud Computing”, Comm. ACM, Vol. 53, No. 4, pp. 50–58,2010.
 Ayushi, “A Symmetric Key Cryptographic Algorithm”, International Journal of Computer Applications (0975 – 8887), Vol. 1, No. 15, pp. 1-4,2010.
 J. Blomer, M. Otto, and J. P. Seifert, “Sign change fault attacks on elliptic curve cryptosystems”, Fault Diagnosis and Tolerance in Cryptography, pp. 36-52, 2006.
 S. K. Sood, “A combined approach to ensure data security in cloud computing,” Journal of Network and Computer Applications, Vol. 35, No. 6, pp. 1831–1838, 2012.
 R. Manjusha and R. Ramachandran, “Comparative study of attribute based encryption techniques in cloud computing,” In Embedded Systems (ICES), 2014 International Conference on. IEEE, pp.116–120,2014.
 B.B. Brumley and N. Tuveri, “Remote timing attacks are still practical”, Computer Security –ESORICS, pp. 355-371, 2011.
 Patrick J. Flinn and James M. Jordan, “Using the RSA Algorithm for Encryption and Digital Signatures: Can You Encrypt, Decrypt, Sign and Verify without Infringing the RSA Patent”, International Journal of Computer Science and Network Security, Vol.12 No.3, pp-82, March 2012.
 G. Hu, D. Xiao, T. Xiang, S. Bai, and Y. Zhang, “A compressive sensing based privacy preserving outsourcing of image storage and identity authentication service in cloud”, Inf. Sci., Vol. 387, pp. 132-145, May 2017.
 V. Paranjape and V. Pandey, “An improved authentication technique with OTP in cloud computing”, International Journal of Scientific Research in Computer Science and Engineering, Vol. 1, No. 3, pp. 22-26, 2013.