{"title":"使用shak256哈希算法和防伪令牌保护云应用程序","authors":"Bhagath Gopinath, B. Latha","doi":"10.1109/IC3IOT53935.2022.9768008","DOIUrl":null,"url":null,"abstract":"In present days, all important data are transferred to the cloud environment to reduce infrastructure in physical devices. But Cloud attackers can access and steal information from the cloud environment. As a result, it may affect authenticated users and they can't access the application. To overcome the scenario, SHAKE-256 Hash Algorithm & Antiforgery token was proposed to protect the application and safeguard it from hackers. In this paper, SHAKE-256 Hash algorithm and Antiforgery Token were proposed to protect web application and safeguard from hackers.","PeriodicalId":430809,"journal":{"name":"2022 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Securing Cloud Application using SHAKE-256 Hash Algorithm & Antiforgery token\",\"authors\":\"Bhagath Gopinath, B. Latha\",\"doi\":\"10.1109/IC3IOT53935.2022.9768008\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In present days, all important data are transferred to the cloud environment to reduce infrastructure in physical devices. But Cloud attackers can access and steal information from the cloud environment. As a result, it may affect authenticated users and they can't access the application. To overcome the scenario, SHAKE-256 Hash Algorithm & Antiforgery token was proposed to protect the application and safeguard it from hackers. In this paper, SHAKE-256 Hash algorithm and Antiforgery Token were proposed to protect web application and safeguard from hackers.\",\"PeriodicalId\":430809,\"journal\":{\"name\":\"2022 International Conference on Communication, Computing and Internet of Things (IC3IoT)\",\"volume\":\"16 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-03-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 International Conference on Communication, Computing and Internet of Things (IC3IoT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IC3IOT53935.2022.9768008\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Communication, Computing and Internet of Things (IC3IoT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IC3IOT53935.2022.9768008","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Securing Cloud Application using SHAKE-256 Hash Algorithm & Antiforgery token
In present days, all important data are transferred to the cloud environment to reduce infrastructure in physical devices. But Cloud attackers can access and steal information from the cloud environment. As a result, it may affect authenticated users and they can't access the application. To overcome the scenario, SHAKE-256 Hash Algorithm & Antiforgery token was proposed to protect the application and safeguard it from hackers. In this paper, SHAKE-256 Hash algorithm and Antiforgery Token were proposed to protect web application and safeguard from hackers.