Two Way Encryption Process in Cloud by using Secure Hash Algorithm

Authors

  • Mr. Kotresh Naik1 Mr. Anil Kumar2 Department of Information Science and Engineering, Channabasaveshwara Institute of Technology, Gubbi, Karnataka, India.

Abstract

In this paper, a new scheme has been introduced, “Two Way Integrity Algorithm”. The paper presents a way to implement Third Party Auditor (TPA) which not only checks the reliability of Cloud Service Provider (CSP) but also checks the consistency and accountability of data. This paper addresses this challenging open issue of integrity, confidentiality and authentication of data. It provides an efficient data integrity mechanism between the client and the cloud service provider by applying RSA with digital signature on the message digest instead of on the whole data to make the computations faster. It then uses TPA for auditing the data stored in the cloud and finally provides an algorithm to check data integrity between the client and the TPA.
Index Terms: Two way integrity check algorithm, cloud service provider, Third party auditor, message digest.

Downloads

Published

2014-10-30

How to Cite

Mr. Anil Kumar2, M. K. N. (2014). Two Way Encryption Process in Cloud by using Secure Hash Algorithm. International Journal of Engineering Technology and Computer Research, 2(5). Retrieved from https://ijetcr.org/index.php/ijetcr/article/view/57

Issue

Section

Articles