Comparative Analysis of Hash Authentication Algorithms and ECC Based Security Algorithms in Cloud Data
2019 ◽
Vol 8
(1)
◽
pp. 53-61
Keyword(s):
Cloud computing is ensuring the security of stored data in cloud computing servers is one of the mainly demanding issues. In Cloud numerous security issues arises such as authentication, integrity and confidentiality. Different encryption techniques attempt to overcome these data security issues to an enormous extent. Hashing algorithm plays an important role in data integrity, message authentication, and digital signature in modern information security. For security purpose using encryption algorithm like ECC (Elliptic Curve Cryptography) and Authentication of data integrity using hashing algorithms like MD5, and SHA-512. This combination method provides data security, authentication and verification for secure cloud computing.
2014 ◽
Vol 701-702
◽
pp. 1106-1111
◽
Keyword(s):
2013 ◽
Vol 846-847
◽
pp. 1595-1599
Keyword(s):
Keyword(s):