Novel Hash Based Key Generation for Stream Cipher in Cloud

  • K. DeviPriya
  • L. Sumalatha
Conference paper
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 5)


Cloud Computing is an advanced technology which provides services to the users on rental basis. Cloud minimizes the installation cost of hardware, software, applications setup at client side and these services are available at cloud server, accessed by any one, any time, any place through the internet. Apart from the benefits one big challenge faced by the cloud is security problem as the data and resources are not under the control of data owner. Security techniques are required to protect data from the unauthorized access. In this paper, we proposed simple efficient stream cipher to protect information which is stored in the cloud. Also a hash based key is generated for encryption. The size of key is 128 bit and the first 32 bit of the key is used for encrypting each character. This provides strong security to the each character. We implemented our algorithm in azure cloud and the results are evaluated.


Cloud Stream cipher Symmetric encryption Decryption MD5 hashing Key Azure cloud Virtual machine 


  1. 1.
    Sandeep k sood.: A combined approach to ensure data security in cloud computing: Journal of Network and Computer Applications (2012).Google Scholar
  2. 2.
  3. 3.
    Joseph D. Touch: Performance Analysis of MD5: ACM SIGCOMM Computer Communication Review, 1995 - Scholar
  4. 4.
    J. Deepakumara., H. Hey: FPGA Implementation of Md5 hash algorithm: Electrical and Computer, Scholar
  5. 5.
    William Stallings: Cryptography and Network Security, 3rd Edition, Prentice Hall, 2003.Google Scholar
  6. 6.
    Ramgovind S., Eloff MM., Smith E.: The Management of Security in Cloud Computing: International Symposium on Computer Architecture (ISCA), in Portland.Google Scholar
  7. 7.
    S. G. Srikantaswamy, H. D. Phaneendra.: A Cryptosystem Design with Recursive Key Generation Techniques: Procedia Engineering, International Conference on Communication Technology and System Design 2011.Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2017

Authors and Affiliations

  1. 1.Department of Computer Science & EngineeringAditya Engineering CollegeSurampalemIndia
  2. 2.Department of Computer Science & EngineeringUCEK, JNTUKKakinadaIndia

Personalised recommendations