Abstract
Cloud Computing (CC) migrates the application software’s and databases to the huge data hubs, where the administration of data along with services is done by the cloud provider. However, this characteristic, presents various security concerns which have not been well comprehended. Information authentication and its integrity verification are main challenges which are faced by CC today. Recently, many authors proposed hash algorithms for data integrity verification using a one way hash function. However, there are some security limitations of these existing algorithms like high time complexity and lack of proper framework. In this paper, an attempt is made to implement a secure and flexible one way hash function to eliminate these drawbacks. Furthermore, This paper present the security analysis and computation of the proposed algorithm, which shows that the proposed data integrity verification algorithm is more secure and efficient in its implementation and fulfills the performance requisites of a robust hash function.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Berisha, A., et al.: A class of non invertible matrices in GF (2) for practical one way hash algorithm. Int. J. Comput. Appl. 54(18), 15–20 (2012)
Abutaha, M., et al.: New one way hash algorithm using non-invertible matrix. In: Proceedings of International Conference on Computer Medical Applications (ICCMA). IEEE (2013)
Kavuri, S., et al.: Data authentication and integrity verification techniques for trusted/untrusted cloud servers. In: Proceedings of International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 2590–2596, 24–27 September 2014
Acharya, B., et al.: Novel methods of generating self-invertible matrix for Hill cipher algorithm. Int. J. Secur. 1(1), 14–21 (2007)
Zheng, Y., Pieprzyk, J., Seberry, J.: HAVAL — a one-way hashing algorithm with variable length of output (extended abstract). In: Seberry, J., Zheng, Y. (eds.) AUSCRYPT 1992. LNCS, vol. 718, pp. 81–104. Springer, Heidelberg (1993). https://doi.org/10.1007/3-540-57220-1_54
Abutaha, M., et al.: A practical one way hash algorithm based on matrix multiplication. Int. J. Comput. Appl. 23(2), 34–38 (2011)
Srikantaswamy, S.G., et al.: Hash function design using matrix multiplication, ex-or, checksum generation and compression technique approach. Int. J. Comput. Sci. Inf. Technol. Secur. 3(1), 115–119 (2013)
Hamamreh, A.R, et al.: Design of a robust cryptosystem algorithm for non-invertible matrices based on Hill cipher. IJCSNS Int. J. Comput. Sci. Netw. Secur. 9(5), 11–16 (2009)
Kumar, N.G., et al.: Hash based approach for providing privacy and integrity in cloud data storage using digital signatures. Int. J. Comput. Sci. Inf. Technol. 5(6), 8074–8078 (2014)
Tom, P.: Properties of matrices. p. 4 (2015). https://www.tomzap.com/notes/MatricesM340L/Matrices.pdf
Hamamreh, R.A., et al.: Hash algorithm for data integrity based on matrix combination. In: Proceedings of International Arab Conference on Information Technology (2013)
Jogdand, R.M., et al.: Enabling public verifiability and availability for secure data storage in cloud computing. Evolving Syst. 6, 55–65 (2013). Springer
Mell, P., Grance, T.: The NIST Definition of Cloud Computing (ver. 15). National Institute of Standards and Technology, Information Technology Laboratory, 7 October 2009
Li, Y., et al.: Parallel hash function construction based on chaotic maps with changeable parameters. Neural Comput. Appl. 20, 1305–1312 (2011). Springer
Kumari, M., et al.: One-way hash algorithms in cloud computing security - a systematic review. Int. J. Sci. Eng. Res. (UGC Approved Journal) 7(12), 187–191 (2016)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Kumari, M., Nath, R. (2018). A Secure and Flexible One Way Hash Function for Data Integrity Verification in Cloud Computing Environment. In: Bhattacharyya, P., Sastry, H., Marriboyina, V., Sharma, R. (eds) Smart and Innovative Trends in Next Generation Computing Technologies. NGCT 2017. Communications in Computer and Information Science, vol 828. Springer, Singapore. https://doi.org/10.1007/978-981-10-8660-1_40
Download citation
DOI: https://doi.org/10.1007/978-981-10-8660-1_40
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-8659-5
Online ISBN: 978-981-10-8660-1
eBook Packages: Computer ScienceComputer Science (R0)