Blowfish encryption on cloud data storage

 
 
 
  • Abstract
  • Keywords
  • References
  • Untitled
  • PDF
  • Abstract


    Cloud computing stores large amount of data and it acts as a resource pool with a network of large number of computers. To secure large volumes of data stored in cloud we can make use encryption techniques. Encryption is used to encrypt the data into cipher data andsecurely transmit data in open networks. Each type of data has its own features, therefore different techniques should be used to protect confidential data from unauthorized access.We introduce a block-based transformation algorithm based on the combination of data and a well known encryption and decryption algorithm called Blowfish. In this paper we have discussed about cloud computing security issues, mechanism, challenges that cloud service provider face during cloud engineering and presented the metaphoric study of blowfish security algorithm.

     

     

     

  • Keywords


    Blowfish; Cloud Computing; Cipher Text; Decryption; Encryption.

  • References


      [1] Armbrust, Fox, Griffith, Joseph, “Above the clouds: A Berkeley view of cloud computing”[2009].

      [2] Buyya, Venugo, “Cloud Computing and emerging IT platforms: Vision, hype, and reality for delivering Computing as the 5th Utility”, [2008].

      [3] Caceres, Lindner, Vaquero, “A break in the clouds: towards a cloud definition”, [2008].

      [4] Keahey, Fortes, Freeman, “Science Clouds: Early Experiences in Cloud Computing for scientific applications” [2008].

      [5] W. Lee, T. Chen and C. Chieh Lee, "Improvement of an encryption scheme for binary images," Pakistan Journal of Information and Technology. Vol. 2, no. 2, 2003, pp. 191-200. http://www.ansinet.org/

      [6] M. V. Droogenbroech, R. Benedett, "Techniques for a selective encryption of uncompressed and compressed images," In ACIVS’02, Ghent, Belgium. Proceedings of Advanced Concepts for Intelligent Vision Systems, 2002.

      [7] Singhal, Nidhi and Raina, J P S. “Comparative Analysis of AES and RC4 Algorithms for Better Utilization”, International Journal of Computer Trends and Technology, ISSN: 2231-280, July to Aug Issue 2011.

      [8] Irfan Landge, Burhanuddin Contractor, Aamna Patel and RozinaChoudhary "Image encryption and decryption using Blowfish algorithm" Proceedings of the 2012 National Conference of Emerging Trends in Information Technology, Shirpur, Maharashtra, April 21 , 2012.

      [9] http://www.embedded.com/ design/configurable-systems/ 4024599/ Encrypting-data-with-the-Blowfish-algorithm

      [10] https://www.schneier.com/paper-blowfish-fse.html

      [11] https://en.wikipedia.org/wiki/Blowfish_(cipher).


 

HTML

View

Download

Article ID: 15597
 
DOI: 10.14419/ijet.v7i4.15597




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.