Security in Cloud Computing Using Hash Algorithm: A Neural Cloud Data Security Model

Osama Harfoushi, Ruba Obiedat

Abstract


Cloud computing is the delivery of computing resources over the Internet. Examples include, among others, servers, storage, big data, databases, networking, software, and analytics. Institutes that provide cloud computing services are called providers. Cloud computing services were primarily developed to help IT professionals through application development, big data storage and recovery, website hosting, on-demand software delivery, and analysis of significant data patterns that could compromise a system’s security. Given the widespread availability of cloud computing, many companies have begun to implement the system because it is cost-efficient, reliable, scalable, and can be accessed from anywhere at any time. The most demanding feature of a cloud computing system is its security platform, which uses cryptographic algorithm levels to enhance protection of unauthorized access, modification, and denial of services. For the most part, cloud security uses algorithms to ensure the preservation of big data stored on remote servers. This study proposes a methodology to reduce concerns about data privacy by using cloud computing cryptography algorithms to improve the security of various platforms and to ensure customer satisfaction.


Full Text:

PDF


DOI: https://doi.org/10.5539/mas.v12n6p143

Copyright (c) 2018 Osama Harfoushi, Ruba Obiedat

License URL: http://creativecommons.org/licenses/by/4.0

Modern Applied Science   ISSN 1913-1844 (Print)   ISSN 1913-1852 (Online)  Email: mas@ccsenet.org

Copyright © Canadian Center of Science and Education

To make sure that you can receive messages from us, please add the 'ccsenet.org' domain to your e-mail 'safe list'. If you do not receive e-mail in your 'inbox', check your 'bulk mail' or 'junk mail' folders.