Skip to main content

A Secure and Flexible One Way Hash Function for Data Integrity Verification in Cloud Computing Environment

  • Conference paper
  • First Online:
Smart and Innovative Trends in Next Generation Computing Technologies (NGCT 2017)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 828))

Included in the following conference series:

Abstract

Cloud Computing (CC) migrates the application software’s and databases to the huge data hubs, where the administration of data along with services is done by the cloud provider. However, this characteristic, presents various security concerns which have not been well comprehended. Information authentication and its integrity verification are main challenges which are faced by CC today. Recently, many authors proposed hash algorithms for data integrity verification using a one way hash function. However, there are some security limitations of these existing algorithms like high time complexity and lack of proper framework. In this paper, an attempt is made to implement a secure and flexible one way hash function to eliminate these drawbacks. Furthermore, This paper present the security analysis and computation of the proposed algorithm, which shows that the proposed data integrity verification algorithm is more secure and efficient in its implementation and fulfills the performance requisites of a robust hash function.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Berisha, A., et al.: A class of non invertible matrices in GF (2) for practical one way hash algorithm. Int. J. Comput. Appl. 54(18), 15–20 (2012)

    Google Scholar 

  2. Abutaha, M., et al.: New one way hash algorithm using non-invertible matrix. In: Proceedings of International Conference on Computer Medical Applications (ICCMA). IEEE (2013)

    Google Scholar 

  3. Kavuri, S., et al.: Data authentication and integrity verification techniques for trusted/untrusted cloud servers. In: Proceedings of International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 2590–2596, 24–27 September 2014

    Google Scholar 

  4. Acharya, B., et al.: Novel methods of generating self-invertible matrix for Hill cipher algorithm. Int. J. Secur. 1(1), 14–21 (2007)

    Google Scholar 

  5. Zheng, Y., Pieprzyk, J., Seberry, J.: HAVAL — a one-way hashing algorithm with variable length of output (extended abstract). In: Seberry, J., Zheng, Y. (eds.) AUSCRYPT 1992. LNCS, vol. 718, pp. 81–104. Springer, Heidelberg (1993). https://doi.org/10.1007/3-540-57220-1_54

    Chapter  Google Scholar 

  6. Abutaha, M., et al.: A practical one way hash algorithm based on matrix multiplication. Int. J. Comput. Appl. 23(2), 34–38 (2011)

    Google Scholar 

  7. Srikantaswamy, S.G., et al.: Hash function design using matrix multiplication, ex-or, checksum generation and compression technique approach. Int. J. Comput. Sci. Inf. Technol. Secur. 3(1), 115–119 (2013)

    Google Scholar 

  8. Hamamreh, A.R, et al.: Design of a robust cryptosystem algorithm for non-invertible matrices based on Hill cipher. IJCSNS Int. J. Comput. Sci. Netw. Secur. 9(5), 11–16 (2009)

    Google Scholar 

  9. Kumar, N.G., et al.: Hash based approach for providing privacy and integrity in cloud data storage using digital signatures. Int. J. Comput. Sci. Inf. Technol. 5(6), 8074–8078 (2014)

    Google Scholar 

  10. Tom, P.: Properties of matrices. p. 4 (2015). https://www.tomzap.com/notes/MatricesM340L/Matrices.pdf

  11. Hamamreh, R.A., et al.: Hash algorithm for data integrity based on matrix combination. In: Proceedings of International Arab Conference on Information Technology (2013)

    Google Scholar 

  12. Jogdand, R.M., et al.: Enabling public verifiability and availability for secure data storage in cloud computing. Evolving Syst. 6, 55–65 (2013). Springer

    Article  Google Scholar 

  13. Mell, P., Grance, T.: The NIST Definition of Cloud Computing (ver. 15). National Institute of Standards and Technology, Information Technology Laboratory, 7 October 2009

    Google Scholar 

  14. Li, Y., et al.: Parallel hash function construction based on chaotic maps with changeable parameters. Neural Comput. Appl. 20, 1305–1312 (2011). Springer

    Article  Google Scholar 

  15. Kumari, M., et al.: One-way hash algorithms in cloud computing security - a systematic review. Int. J. Sci. Eng. Res. (UGC Approved Journal) 7(12), 187–191 (2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Meena Kumari .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kumari, M., Nath, R. (2018). A Secure and Flexible One Way Hash Function for Data Integrity Verification in Cloud Computing Environment. In: Bhattacharyya, P., Sastry, H., Marriboyina, V., Sharma, R. (eds) Smart and Innovative Trends in Next Generation Computing Technologies. NGCT 2017. Communications in Computer and Information Science, vol 828. Springer, Singapore. https://doi.org/10.1007/978-981-10-8660-1_40

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-8660-1_40

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-8659-5

  • Online ISBN: 978-981-10-8660-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics