Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/ OSF Preprintsarrow_drop_down
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
https://doi.org/10.33767/osf.i...
Article . 2023 . Peer-reviewed
License: CC BY
Data sources: Crossref
versions View all 3 versions
addClaim

This Research product is the result of merged Research products in OpenAIRE.

You have already added 0 works in your ORCID record related to the merged Research product.

Study Security Cloud with SHA-2 Algorithm

Authors: Arnes Vandika;

Study Security Cloud with SHA-2 Algorithm

Abstract

This study explores the relationship between cloud computing and security, concentrating on the use of the SHA-2 cryptographic algorithm. Due to the distributed and shared nature of cloud settings, cloud computing has transformed how information and services are accessed and provided. However, it has also created new security issues. As a reliable cryptographic method for guaranteeing data integrity and authentication, the Secure Hash Algorithm 2 (SHA-2) has grown in popularity. This study intends to investigate how SHA?2 is integrated into cloud security frameworks and evaluate how well it protects data and communication inside cloud infrastructures. This study aims to offer insights into improving the overall security posture of cloud-based systems by studying the application of SHA-2 across various cloud service types and deployment situations.To evaluate the real-world effects of using the SHA-2 algorithm to secure cloud environments, this project combines theoretical analysis with hands-on experimentation. In the research, the computational overhead of SHA-2 in cloud operations is evaluated while taking into account latency and performance deterioration. The paper also looks into possible flaws and attack methods that could take advantage of SHA-2's shortcomings when applied in cloud scenarios. The research contributes to a greater knowledge of the trade-offs between security and performance in cloud systems utilizing the SHA-2 technique by addressing these issues. The results of this study may serve as a reference for cloud architects, security experts, and researchers when deciding whether to use strong cryptographic methods like SHA-2 to protect the confidentiality and integrity of data in cloud-based applications.

Related Organizations
Keywords

Engineering, bepress|Engineering|Computer Engineering|Digital Communications and Networking, bepress|Engineering, Computer Engineering, Digital Communications and Networking, bepress|Engineering|Computer Engineering

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    0
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
0
Average
Average
Average
hybrid