Cloud Investigate

Security in Cloud Computing- Hash Function

Download now Free registration required

Executive Summary

There is a critical need to securely store, manage, share and analyze massive amounts of complex (e.g., semi-structure and unstructured) data to determine patterns and trends in order to improve the quality of healthcare, better safeguard the nation and explore alternative energy. Because of the critical nature of the applications, it is important that clouds be secure. The major security challenge with clouds is that the owner of the data may not have control of where the data is placed. This is because, if one wants to exploit the benefits of using cloud computing, one must also utilize the resource allocation and scheduling provided by clouds. Therefore the authors need to safeguard the data in the midst of entrusted processes.

  • Format: PDF
  • Size: 351.8 KB