TY - JOUR
T1 - Security audit in cloud-based server by using encrypted data AES -256 and SHA-256
AU - Husni, M.
AU - Ciptaningtyas, H. T.
AU - Suadi, W.
AU - Ijtihadie, R. M.
AU - Anggoro, R.
AU - Salam, M. F.
AU - Arifiani, S.
N1 - Publisher Copyright:
© Published under licence by IOP Publishing Ltd.
PY - 2020/5/18
Y1 - 2020/5/18
N2 - Cloud service provides access to servers, databases, storage, and any application services over the Internet. Cloud computing allows users to store their data in the servers. This will ease user to access the data everywhere by only using the internet connection from any devices. Cloud service allows users to run application to many mobile users or to support business critical operations. Cloud service also provides rapid access to the flexible and low-cost IT resources. By using the cloud service technology, there is no need to invest a hardware and spent much time to manage that hardware. Although cloud technology has many advantages, there are also some disadvantages such as some security issues. The usage of internet connection gives a high risk in cyber-attacks. Sometimes the cloud service provider also misuses the data stored in the server. This paper proposes the integrity verification of data stored in the server by using Hash function SHA-256 and AES-256. The proposed scheme combines the mechanism of encryption as a strategy to verify the data integrity. This method will encrypt files stored in the servers that aims to ensure the integrity of file stored. This research is expected to help use to secure their data.
AB - Cloud service provides access to servers, databases, storage, and any application services over the Internet. Cloud computing allows users to store their data in the servers. This will ease user to access the data everywhere by only using the internet connection from any devices. Cloud service allows users to run application to many mobile users or to support business critical operations. Cloud service also provides rapid access to the flexible and low-cost IT resources. By using the cloud service technology, there is no need to invest a hardware and spent much time to manage that hardware. Although cloud technology has many advantages, there are also some disadvantages such as some security issues. The usage of internet connection gives a high risk in cyber-attacks. Sometimes the cloud service provider also misuses the data stored in the server. This paper proposes the integrity verification of data stored in the server by using Hash function SHA-256 and AES-256. The proposed scheme combines the mechanism of encryption as a strategy to verify the data integrity. This method will encrypt files stored in the servers that aims to ensure the integrity of file stored. This research is expected to help use to secure their data.
UR - http://www.scopus.com/inward/record.url?scp=85086332189&partnerID=8YFLogxK
U2 - 10.1088/1757-899X/830/3/032015
DO - 10.1088/1757-899X/830/3/032015
M3 - Conference article
AN - SCOPUS:85086332189
SN - 1757-8981
VL - 830
JO - IOP Conference Series: Materials Science and Engineering
JF - IOP Conference Series: Materials Science and Engineering
IS - 3
M1 - 032015
T2 - 3rd International Conference on Innovation in Engineering and Vocational Education 2019, ICIEVE 2019
Y2 - 26 November 2019
ER -