Professional Documents
Culture Documents
C. Multienancy
Shared access or multitenancy is also considered as one of
the major risks to data in cloud computing. Since multiple
users are using the same shared computing resources like
CPU,
As illustrated in Fig 3, the plain text is divided in to blocks This hash function can be a very simple mathematical
of data, often 64 bits. These blocks of data are then encrypted function like the one shown in equation (1) or very complex.
using an encryption key to produce a cipher text. F(x) = x mod 10 (1)
B. Stream Ciphers
This technique of encrypting data is also called state
cipher since it depends upon the current state of cipher. In this
technique, each bit is encrypted instead of blocks of data. An
encryption key and an algorithm is applied to each and every
bit, one at a time.