SHA Based Secure Data Storing using Cloud Based Adoption Framework

Authors

  • Malisetty Veera V Rama Rao  Assistant Professor, Department of CSE, Shri Vishnu Engineering College for Women (A), Vishnupur, West Godavari District, Bhimavaram, Andhra Pradesh, India

Keywords:

CCAF, FGSM, BPMN, Cloud Security, SHA Algorithm with Hash function

Abstract

A current or recent study on cloud security expresses that the security of clients' information has the most astounding need and also concern. Clients store immense measures of touchy information on a cloud. Sharing touchy information will enable endeavours to diminish the cost of giving clients customized benefits and offer some incentive included information administrations. In any case, secure information sharing is hazardous. Security is a standout amongst the most troublesome errand to actualize in cloud computing. Diverse types of assaults in the application side and in the equipment parts. This paper proposes a framework for secure touchy information partaking in cloud, including secure information conveyance, stockpiling, use, and demolition on a semi-confided in cloud condition. We trust this must have the capacity to accomplish with an approach that is deliberate, adoptable and all around organized. Subsequently, this paper has built up a framework known as Cloud Computing Adoption Framework (CCAF) which has been modified for securing cloud information. This paper clarifies the review, method of reasoning and parts in the CCAF to ensure information security. CCAF is shown by the framework configuration in view of the necessities and the execution exhibited by the CCAF multi-layered security. We propose an answer in light of emerging needs to enhance current Cloud security, Fine Grained Security Model (FGSM) which is intended to coordinate three distinct sorts of security techniques and offer multi-layered security for a superior information assurance. Since our Server farm has 10 peta bytes of information, there is an enormous errand to give continuous insurance and isolate. This paper talks about the secure hash algorithm (SHA) initially created by the National Security Agency (NSA) as SHA-0 and later gave over to the National Foundation of Norms and Innovation (NIST). Be that as it may, keeping in mind the end goal to adjust a blemish in the first algorithm, the NSA later introduced the modified rendition of SHA-0 and alluded it as SHA. SHA is a hash work that takes a variable length input message and creates a settled length yield message called the hash or the message process of the first message. The paper likewise delivers the after effects of execution of the SHA algorithm. The SHA algorithm is of specific significance on account of its utilization with the Digital Signature Algorithm (DSA) for digital signatures. We utilize Business Process Modelling Notation (BPMN) to reproduce how information is being used. The utilization of BPMN re-enactment or simulation enables us to assess the picked security exhibitions before genuine execution.

References

  1. SHA hash functions - Wikipedia, the free encyclopedia. http://en.wikipedia.org/wiki/SHA#Description_of_the_algorithms
  2. Wade Trappe, Lawrence C. Washington. 2006. Introduction to Cryptography with Coding Theory. New Jersey: Pearson Prentice Hall.
  3. R. Rivest MIT Laboratory for Computer Science and RSA Data Security, Inc. Internet RFC(1320) April 1992.
  4. Chang, V., Walters, R. J. & Wills, G., 2013 b. Cloud Storage and Bioinformatics in a private cloud deployment: Lessons for Data Intensive research. In, Cloud Computing and Service Science, Springer Lecture Notes Series, Springer Book.
  5. Chang, V. & Ramachandran, M., Towards achieving Big Data Security with the Cloud Computing Adoption Framework, IEEE Transactions on Services Computing, forthcoming. DataLossDB.org survey, 2013, accessible on http://datalossdb.org/us_states in 2013.
  6. IBM, 2010. Defining a framework for cloud adoption, technical report.
  7. Khajeh-Hosseini, A., Greenwood, D., & Sommerville, I., 2010, July. Cloud migration: A case study of migrating an enterprise it system to iaas. In Cloud Computing (CLOUD), 2010 IEEE 3rd International Conference on (pp. 450-457).
  8. Chang, V., Li, C. S., De Roure, D., Wills, G., Walters, R. J., & Chee, C., 2012. The financial clouds review. Cloud Computing Advancements in Design, Implementation, and Technologies, 125.

Downloads

Published

2018-04-30

Issue

Section

Research Articles

How to Cite

[1]
Malisetty Veera V Rama Rao, " SHA Based Secure Data Storing using Cloud Based Adoption Framework, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 3, pp.1101-1107, March-April-2018.