Blowfish encryption on cloud data storage

  • Authors

    • Degala Divya Priya Mtech
    • Bethala Shirisha Mtech
    • B. Pravallika Mtech
    2018-12-29
    https://doi.org/10.14419/ijet.v7i4.15597
  • Blowfish, Cloud Computing, Cipher Text, Decryption, Encryption.
  • Cloud computing stores large amount of data and it acts as a resource pool with a network of large number of computers. To secure large volumes of data stored in cloud we can make use encryption techniques. Encryption is used to encrypt the data into cipher data andsecurely transmit data in open networks. Each type of data has its own features, therefore different techniques should be used to protect confidential data from unauthorized access.We introduce a block-based transformation algorithm based on the combination of data and a well known encryption and decryption algorithm called Blowfish. In this paper we have discussed about cloud computing security issues, mechanism, challenges that cloud service provider face during cloud engineering and presented the metaphoric study of blowfish security algorithm.

     

     

     
  • References

    1. [1] Armbrust, Fox, Griffith, Joseph, “Above the clouds: A Berkeley view of cloud computingâ€[2009].

      [2] Buyya, Venugo, “Cloud Computing and emerging IT platforms: Vision, hype, and reality for delivering Computing as the 5th Utilityâ€, [2008].

      [3] Caceres, Lindner, Vaquero, “A break in the clouds: towards a cloud definitionâ€, [2008].

      [4] Keahey, Fortes, Freeman, “Science Clouds: Early Experiences in Cloud Computing for scientific applications†[2008].

      [5] W. Lee, T. Chen and C. Chieh Lee, "Improvement of an encryption scheme for binary images," Pakistan Journal of Information and Technology. Vol. 2, no. 2, 2003, pp. 191-200. http://www.ansinet.org/

      [6] M. V. Droogenbroech, R. Benedett, "Techniques for a selective encryption of uncompressed and compressed images," In ACIVS’02, Ghent, Belgium. Proceedings of Advanced Concepts for Intelligent Vision Systems, 2002.

      [7] Singhal, Nidhi and Raina, J P S. “Comparative Analysis of AES and RC4 Algorithms for Better Utilizationâ€, International Journal of Computer Trends and Technology, ISSN: 2231-280, July to Aug Issue 2011.

      [8] Irfan Landge, Burhanuddin Contractor, Aamna Patel and RozinaChoudhary "Image encryption and decryption using Blowfish algorithm" Proceedings of the 2012 National Conference of Emerging Trends in Information Technology, Shirpur, Maharashtra, April 21 , 2012.

      [9] http://www.embedded.com/ design/configurable-systems/ 4024599/ Encrypting-data-with-the-Blowfish-algorithm

      [10] https://www.schneier.com/paper-blowfish-fse.html

      [11] https://en.wikipedia.org/wiki/Blowfish_(cipher).

  • Downloads

  • How to Cite

    Divya Priya, D., Shirisha, B., & Pravallika, B. (2018). Blowfish encryption on cloud data storage. International Journal of Engineering & Technology, 7(4), 4250-4252. https://doi.org/10.14419/ijet.v7i4.15597