z-logo
open-access-imgOpen Access
Comparative Analysis of Hash Authentication Algorithms and ECC Based Security Algorithms in Cloud Data
Author(s) -
S. Hendry Leo Kanickam,
L. Jayasimman
Publication year - 2019
Publication title -
asian journal of computer science and technology
Language(s) - English
Resource type - Journals
eISSN - 2583-7907
pISSN - 2249-0701
DOI - 10.51983/ajcst-2019.8.1.2118
Subject(s) - computer science , algorithm , cloud computing , hash function , elliptic curve cryptography , encryption , data integrity , md5 , digital signature , data authentication algorithm , authentication (law) , secure hash algorithm , data security , computer security , cloud computing security , cryptographic hash function , cryptography , sha 2 , public key cryptography , authentication protocol , operating system
Cloud computing is ensuring the security of stored data in cloud computing servers is one of the mainly demanding issues. In Cloud numerous security issues arises such as authentication, integrity and confidentiality. Different encryption techniques attempt to overcome these data security issues to an enormous extent. Hashing algorithm plays an important role in data integrity, message authentication, and digital signature in modern information security. For security purpose using encryption algorithm like ECC (Elliptic Curve Cryptography) and Authentication of data integrity using hashing algorithms like MD5, and SHA-512. This combination method provides data security, authentication and verification for secure cloud computing.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here