An Advanced Security Analysis by Using Blowfish Algorithm

Authors

  • R. Vasantha  Research Scholar, Department of CSE, Acharya Nagarjuna University, Guntur, India
  • Dr. R. Satya Prasad  Associate Professor, Department of CSE, Acharya Nagarjuna University, Guntur, India

Keywords:

Cloud computing, Cryptography, Encryption, Decryption, Cipher Text, DES, TDES, AES, RSA, Homomorphic, IDEA, Blowfish

Abstract

Cloud computing give off an impression of being an extremely prominent and intriguing processing innovation. Each third individual is utilizing distributed computing straightforwardly or in a roundabout way for instance email, most usually utilized utilization of distributed computing, you can get to your mail anyplace whenever. Your email account isn't unmistakable on your PC yet you need to get to that with the assistance of web. Like email distributed computing give numerous different administrations, for example, stockpiling of any sort of information, access to various applications, assets and so forth. So clients can undoubtedly access and store information with ease and without stressing over how these administrations are given to client. Because of this adaptability everybody is exchanging information to cloud. To store information on cloud client needs to send their information to the outsider who will oversee and store information. So it is imperative for the organization to secure that information. Information is said to be secured if secrecy, accessibility, trustworthiness is available. To secure information we have distinctive calculations. In this paper we will talk about the diverse cryptography of algorithms.

References

  1. Alexa Huth and James Cebula ‘The Basics of IOT, United States Computer Emergency Readiness Team. (2011).
  2. Anitha Y, "Security Issues in cloud computing with IOT", "International Journal of Thesis Projects and Dissertations "(IJTPD) Vol. 1, Issue 1, PP :( 1-6), Month: October 2013.
  3. Qi. Zhang Lu. Cheng, Raouf Boutaba, "Cloud computing IOT : state-Of-the-art and research Challenges", "The Brazilian Computer Society", April 2010.
  4. Garima Saini, Gurgaon Naveen Sharma,"Triple Security of Data in Cloud Computing IOT ", Garima Saini et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol.5 (4) , 2014,
  5. Yogesh Kumar, Rajiv Munjal and Harsh Sharma,"Comparison of Symmetric and Asymmetric Cryptography with Existing Vulnerabilities and Countermeasures" IJCSMS International Journal of Computer Science and Management Studies, Vol. 11, Issue 03, Oct 2011.
  6. D. S. Abdul. Elminaam, H. M. Abdul Kader and M. M. Hadhoud ,"Performance Evaluation of Symmetric Encryption Algorithms", Communications of the IBIMA Volume 8, 2009.
  7. Gurpreet Singh, Supriya Kinger "Integrating AES, DES, and 3-DES Encryption Algorithms for Enhanced Data Security IOT" International Journal of Scientific & Engineering Research, Volume 4, Issue 7, July-2016.
  8. Alexa Huth and James Cebula ‘The Basics of Cloud Computing’, United States Computer Emergency Readiness Team. (2011).
  9. Shakeeba S. Khan and Prof. R.R. Tuteja, ‘Security in Cloud Computin Using Cryptographic Algorithms’, International Journal of Innovative Research in Computer and Communication Engineering. January 1, (2015) ISSN (online): 2320-9801, (Print): 2320-9798 Vol. 3, Issue.
  10. Maha TEBAA, Said EL HAJJI and Abdellatif EL GHAJI, ‘Homomorphic Encryption Applied to the Cloud Computing Security’, World Congress on Engineering. July 4 (2012) Vol. 1, London U.K. ISBN: 978-988-19251-3-8, ISSN: 2078-0958 (Print); ISSN: 2078-0966 (online).
  11. G. Devi and M. Pramod Kumar, ‘Cloud Computing: A CRM Service Based on a Separate Encryption and Decryption using Blowfish Algorithm’, International Journal of Computer Trends and Technology. (2012) Vol. 3 Issue 4, ISSN: 2231-2803, pp.592-596.
  12. Manzoor Hussain Dar, Pardeep Mittal and Vinod Kumar, ‘A Comparative Study of Cryptographic Algorithms’, International Journal of Computer Science and Network. June (2014) ISSN(Online): 2277-5420, Volume 3, Issue 3.
  13. Rashmi Nigoti, Manoj Jhuria and Dr. Shailendra Singh, ‘A survey of Cryptographic Algorithm for Cloud Computing’, International Journal of Emerging Technologies in Computational and Applied Science.(2013) ISSN(Print): 2279-0047, (Online): 2279-0055.
  14. Mohit Marwaha, Rajeev Bedi, Amritpal Singh and Tejinder Singh, ‘Comparative Analysis of Cryptographic Algorithms’, International Journal of Advanced Engineering Technology. July-Sept. (2013) E-ISSN 0976-3945.
  15. Simar Preet Singh and Gurpinder Singh Samra, ‘Managing Vulnerabilites in Cloud Computing’, National Conference on Engineering Applications(NCEA-2011), St. Solider Institute of Emerging Technology and Management, Jalandhar, Punjab. April 9 (2011) pg 243-246.

Downloads

Published

2017-12-31

Issue

Section

Research Articles

How to Cite

[1]
R. Vasantha, Dr. R. Satya Prasad, " An Advanced Security Analysis by Using Blowfish Algorithm, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 6, pp.1031-1036, November-December-2017.