ICIEVE 2019 Conference

Security Audit in Cloud based Server by Using Encrypted Data AES -256 and SHA-256
Muchammad Husni, Henning Titi Ciptaningtyas, Wahyu Suadi, Royyana Muslim Ijtihadie, Radityo Anggoro, Muhammad Fajri Salam, Siska Arifiani

Institut Teknologi Sepuluh Nopember Surabaya


Abstract

Cloud service provides access to servers, databases, storage, and any application services over the Internet. Cloud computing allows users to store their data in the servers. This will ease user to access the data everywhere by only using the internet connection from any devices. Cloud service allows users to run application to many mobile users or to support business critical operations. Cloud service also provides rapid access to the flexible and low-cost IT resources. By using the cloud service technology, there is no need to invest a hardware and spent much time to manage that hardware. Although cloud technology has many advantages, there are also some disadvantages such as some security issues. The usage of internet connection gives a high risk in cyber-attacks. Sometimes the cloud service provider also misuses the data stored in the server. This paper proposes the integrity verification of data stored in the server by using Hash function SHA-256 and AES-256. The proposed scheme combines the mechanism of encryption as a strategy to verify the data integrity. This method will encrypt files stored in the servers. This method aims to ensure the integrity of file stored in the cloud server. This is expected to help users to secure their data.

Keywords: AES-256, SHA-256, Cloud Computing, File Integrity, The Verification of File Integrity

Topic: Computers, Internet, Multimedia in Engineering Education

Link: https://ifory.id/abstract-plain/WhgGeuPHxK7M

Web Format | Corresponding Author (Siska Arifiani)