Analytical Performance of Modified One-Way Hash Algorithm for Data Integrity Verification in Cloud Computing

Analytical Performance of Modified One-Way Hash Algorithm for Data Integrity Verification in Cloud Computing

Meena Kumari, Rajender Nath
Copyright: © 2018 |Volume: 9 |Issue: 2 |Pages: 11
ISSN: 1948-5018|EISSN: 1948-5026|EISBN13: 9781522545552|DOI: 10.4018/IJGC.2018070102
Cite Article Cite Article

MLA

Kumari, Meena, and Rajender Nath. "Analytical Performance of Modified One-Way Hash Algorithm for Data Integrity Verification in Cloud Computing." IJGC vol.9, no.2 2018: pp.16-26. http://doi.org/10.4018/IJGC.2018070102

APA

Kumari, M. & Nath, R. (2018). Analytical Performance of Modified One-Way Hash Algorithm for Data Integrity Verification in Cloud Computing. International Journal of Green Computing (IJGC), 9(2), 16-26. http://doi.org/10.4018/IJGC.2018070102

Chicago

Kumari, Meena, and Rajender Nath. "Analytical Performance of Modified One-Way Hash Algorithm for Data Integrity Verification in Cloud Computing," International Journal of Green Computing (IJGC) 9, no.2: 16-26. http://doi.org/10.4018/IJGC.2018070102

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Cloud computing is a revolution in the IT industry due to its characteristics of scalability, efficiency, and availability. Along with these benefits, cloud computing comes with certain security issues that a user has to take into consideration. Security of data and its integrity verification in the cloud are major issues that act as a barrier to the adoption of cloud computing. In the authors' previously published work, a one-way hash function was proposed to verify the data integrity at the cloud storage site. This article further extends prior work. In this article, the modified one-way hash algorithm is implemented by using a Hadoop distributed file system (HDFS) service of Hadoop environment and analytical testing is performed to ascertain its performance. Statistical and experimental results reveal the proposed algorithm is robust, which ensures data integrity and fulfills mostly all essential features of a secure hash function.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.