Research Article Open Access

Security based Approach of SHA 384 and SHA 512 Algorithms in Cloud Environment

Thambusamy Velmurugan1 and Sivakumar Karthiga1
  • 1 D. G. Vaishnav College, India


Cloud computing is going to be the next big thing in the era of internet world. As the world moves ahead towards enhancement of the cloud features we also have to take a serious consideration of the enhancing cloud securities to protect the end-user’s data. The major usage of this cloud feature are widely applied in the cloud based IT sector for operation advancement, Data storage; on-demand software delivery and many more operations which also requires the scrutiny of the data that is being shared. This research work is carried out to enhance the security of the end-users using secured hashing algorithm. In this, the principles of hash utility are applied that makes the intruders difficult to decode the encrypted password of the user. Even if the intruder or even the administrator of the server tries to decode the encryption for multiple attempts to decode the password the hash codes of the server keeps on changing for multiple attempts. This research work gives a new solution for the concern that is getting raised on the data privacy. The usage of the secured hashing algorithm helps to develop platform that ensure data security for the end-user in the cloud environment. For that the Secure Hashing Algorithm (SHA) 384& SHA 512 is taken and implemented by a practical approach in cloud. For the implementation of these two algorithms, the major attacks faced by end user namely Brute force attack, Man in Middle attack and Rainbow attack are experimented under cloud platform. From the experimental results, it is identified that the best algorithm to protect the data.

Journal of Computer Science
Volume 16 No. 10, 2020, 1439-1450


Submitted On: 12 August 2020 Published On: 28 October 2020

How to Cite: Velmurugan, T. & Karthiga, S. (2020). Security based Approach of SHA 384 and SHA 512 Algorithms in Cloud Environment. Journal of Computer Science, 16(10), 1439-1450.

  • 5 Citations



  • Network Security
  • Hash Technique
  • Secure Hashing Algorithm 384
  • Secure Hashing Algorithm 512