10.2 HASHING CLOUD SECURITY MECHANISM

10.2. Hashing
The hashing mechanism is used when a one-way, non-reversible form of data protection is required.
Once hashing has been applied to a message, it is locked and no key is provided for the message to be unlocked.
A common application of this mechanism is the storage of passwords.
Hashing technology can be used to derive a hashing code or message digest from a message, which is often of a fixed length and smaller than the original message.
The message sender can then utilize the hashing mechanism to attach the message digest to the message.
The recipient applies the same hash function to the message to verify that the produced message digest is identical to the one that accompanied the message. Any alteration to the original data results in an entirely different message digest and clearly indicates that tampering has occurred.

In addition to its utilization for protecting stored data, the cloud threats that can be mitigated by the hashing mechanism include malicious intermediary and insufficient authorization.
An example of the latter is illustrated in Figure 10.3.

Figure 10.3. A hashing function is applied to protect the integrity of a message that is intercepted and altered by a malicious service agent, before it is forwarded.
The firewall can be configured to determine that the message has been altered, thereby enabling it to reject the message before it can proceed to the cloud service.

Cloud computing concept Book Link
CLOUDCOMPUTING THEORY PLAYLIST
CLOUD COMPUTING PRACTICAL PLAYLIST
Subscribe the Channel Link
IF any #Query or #Doubt #DM on #Instagram :- #bansode_ajay_2102
#bansode_tech_solution

Comments

Popular posts from this blog

Load Data From Excel To Grid View in Asp.net C#

Advance Web Programming | TYIT | Mumbai University | Practical 1A | Product of 4 Value

10.5. Identity and Access Management (IAM) in Cloud Computing