Blowfish encryption on cloud data storage

  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract

    Cloud computing stores large amount of data and it acts as a resource pool with a network of large number of computers. To secure large volumes of data stored in cloud we can make use encryption techniques. Encryption is used to encrypt the data into cipher data andsecurely transmit data in open networks. Each type of data has its own features, therefore different techniques should be used to protect confidential data from unauthorized access.We introduce a block-based transformation algorithm based on the combination of data and a well known encryption and decryption algorithm called Blowfish. In this paper we have discussed about cloud computing security issues, mechanism, challenges that cloud service provider face during cloud engineering and presented the metaphoric study of blowfish security algorithm.




  • Keywords

    Blowfish; Cloud Computing; Cipher Text; Decryption; Encryption.

  • References

      [1] Armbrust, Fox, Griffith, Joseph, “Above the clouds: A Berkeley view of cloud computing”[2009].

      [2] Buyya, Venugo, “Cloud Computing and emerging IT platforms: Vision, hype, and reality for delivering Computing as the 5th Utility”, [2008].

      [3] Caceres, Lindner, Vaquero, “A break in the clouds: towards a cloud definition”, [2008].

      [4] Keahey, Fortes, Freeman, “Science Clouds: Early Experiences in Cloud Computing for scientific applications” [2008].

      [5] W. Lee, T. Chen and C. Chieh Lee, "Improvement of an encryption scheme for binary images," Pakistan Journal of Information and Technology. Vol. 2, no. 2, 2003, pp. 191-200.

      [6] M. V. Droogenbroech, R. Benedett, "Techniques for a selective encryption of uncompressed and compressed images," In ACIVS’02, Ghent, Belgium. Proceedings of Advanced Concepts for Intelligent Vision Systems, 2002.

      [7] Singhal, Nidhi and Raina, J P S. “Comparative Analysis of AES and RC4 Algorithms for Better Utilization”, International Journal of Computer Trends and Technology, ISSN: 2231-280, July to Aug Issue 2011.

      [8] Irfan Landge, Burhanuddin Contractor, Aamna Patel and RozinaChoudhary "Image encryption and decryption using Blowfish algorithm" Proceedings of the 2012 National Conference of Emerging Trends in Information Technology, Shirpur, Maharashtra, April 21 , 2012.

      [9] design/configurable-systems/ 4024599/ Encrypting-data-with-the-Blowfish-algorithm






Article ID: 15597
DOI: 10.14419/ijet.v7i4.15597

Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.