Security audit in cloud-based server by using encrypted data AES -256 and SHA-256

Research output: Contribution to journalConference articlepeer-review

Abstract

Cloud service provides access to servers, databases, storage, and any application services over the Internet. Cloud computing allows users to store their data in the servers. This will ease user to access the data everywhere by only using the internet connection from any devices. Cloud service allows users to run application to many mobile users or to support business critical operations. Cloud service also provides rapid access to the flexible and low-cost IT resources. By using the cloud service technology, there is no need to invest a hardware and spent much time to manage that hardware. Although cloud technology has many advantages, there are also some disadvantages such as some security issues. The usage of internet connection gives a high risk in cyber-attacks. Sometimes the cloud service provider also misuses the data stored in the server. This paper proposes the integrity verification of data stored in the server by using Hash function SHA-256 and AES-256. The proposed scheme combines the mechanism of encryption as a strategy to verify the data integrity. This method will encrypt files stored in the servers that aims to ensure the integrity of file stored. This research is expected to help use to secure their data.

Original languageEnglish
Article number032015
JournalIOP Conference Series: Materials Science and Engineering
Volume830
Issue number3
DOIs
Publication statusPublished - 18 May 2020
Event3rd International Conference on Innovation in Engineering and Vocational Education 2019, ICIEVE 2019 - Bandung, West Java, Indonesia
Duration: 26 Nov 2019 → …

Fingerprint

Dive into the research topics of 'Security audit in cloud-based server by using encrypted data AES -256 and SHA-256'. Together they form a unique fingerprint.

Cite this