
This study explores the relationship between cloud computing and security, concentrating on the use of the SHA-2 cryptographic algorithm. Due to the distributed and shared nature of cloud settings, cloud computing has transformed how information and services are accessed and provided. However, it has also created new security issues. As a reliable cryptographic method for guaranteeing data integrity and authentication, the Secure Hash Algorithm 2 (SHA-2) has grown in popularity. This study intends to investigate how SHA?2 is integrated into cloud security frameworks and evaluate how well it protects data and communication inside cloud infrastructures. This study aims to offer insights into improving the overall security posture of cloud-based systems by studying the application of SHA-2 across various cloud service types and deployment situations.To evaluate the real-world effects of using the SHA-2 algorithm to secure cloud environments, this project combines theoretical analysis with hands-on experimentation. In the research, the computational overhead of SHA-2 in cloud operations is evaluated while taking into account latency and performance deterioration. The paper also looks into possible flaws and attack methods that could take advantage of SHA-2's shortcomings when applied in cloud scenarios. The research contributes to a greater knowledge of the trade-offs between security and performance in cloud systems utilizing the SHA-2 technique by addressing these issues. The results of this study may serve as a reference for cloud architects, security experts, and researchers when deciding whether to use strong cryptographic methods like SHA-2 to protect the confidentiality and integrity of data in cloud-based applications.
Engineering, bepress|Engineering|Computer Engineering|Digital Communications and Networking, bepress|Engineering, Computer Engineering, Digital Communications and Networking, bepress|Engineering|Computer Engineering
Engineering, bepress|Engineering|Computer Engineering|Digital Communications and Networking, bepress|Engineering, Computer Engineering, Digital Communications and Networking, bepress|Engineering|Computer Engineering
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 0 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
