Data Storage Security in Mobile Cloud Computing (MCC) using Improved Blowfish Algorithm

Authors

  • Seada Abdu Wakene  School of Computing & Informatics, College of Engineering & Technology, Dilla University, Dilla, Ethiopia
  • Sisay Muleta Hababa  School of Computing & Informatics, College of Engineering & Technology, Dilla University, Dilla, Ethiopia
  • Gutema Seboka Daba  School of Computing & Informatics, College of Engineering & Technology, Dilla University, Dilla, Ethiopia
  • K S Ananda Kumar  School of Computing & Informatics, College of Engineering & Technology, Dilla University, Dilla, Ethiopia

DOI:

https://doi.org/10.32628/CSEIT217620

Keywords:

Blowfish algorithm, Cloud computing, Mobile cloud computing (MCC), Secured hash function.

Abstract

Mobile cloud computing (MCC) combines cloud computing and mobile computing to deliver vast computational resources to mobile consumers, network operators, and cloud computing providers. You may access your data from anywhere in the globe using any mobile device that is linked to the Internet. Cloud computing provides access to data in real-time whenever and wherever want. Any conventional mobile device can benefit from MCC's infrastructure, computational capacity, software, and platform services. Network security, web application security, data access, authentication, authorization, data confidentiality, and data breach are all concerns of MCC's security. Because mobile devices lack sufficient storage and processing power, their data storage capacity is limited. Users of mobile devices may inadvertently provide sensitive information over the network or through the application. Therefore, data security is the main concern for mobile device users. The objective of this paper is to find a solution that can enhance technical requirements with relation to user’s data security and privacy in mobile cloud computing. To achieve this improved blowfish encryption algorithm is used to encrypt each user’s data security and where the shared secret key is hash down using message digest called secured hash function. Hashing can increase the integrity and privacy of user data. The proposed algorithm is evaluated with a normal blowfish algorithm and 3DES with different parameters. Improved blowfish algorithm shows better performance than normal blowfish algorithm and 3DES. In this work, we have developed web-based application where the Amazon MySQL RDS database is used for data storage.

References

  1. M. Computing, M. Padma, and M. L. Neelima, “Mobile Cloud Computing : Issues from a Security Perspective,” vol. 3, no. 5, pp. 972–977, 2014.
  2. A. Oludele and O. Oluwabukola, “A survey of mobile cloud computing applications: Perspectives and challenges,” 7th Int. Multi-Conference Complexity, Informatics Cybern. IMCIC 2016 7th Int. Conf. Soc. Inf. Technol. ICSIT 2016 – Proc., vol. 1, pp. 238–243, 2016.
  3. R. Kaur and S. Kinger, “Analysis of Security Algorithms in Cloud Computing,” vol. 3, no. 3, pp. 171–176, 2014.
  4. D. Zissis and D. Lekkas, “Addressing cloud computing security issues,” Futur. Gener. Comput. Syst., vol. 28, no. 3, pp. 583–592, 2012.
  5. S. Subashini and V. Kavitha, “Journal of Network and Computer Applications A survey on security issues in service delivery models of cloud computing,” J. Netw. Comput. Appl., 2010.
  6. A. N. Khan, M. L. Mat Kiah, S. U. Khan, and S. A. Madani, “Towards secure mobile cloud computing: A survey,” Futur. Gener. Comput. Syst., vol. 29, no. 5, pp. 1278–1299, 2013.
  7. G. Singh, A. Kr. Singla, and K. S. Sandha, “Superiority of Blowfish Algorithm in Wireless Networks,” Int. J. Comput. Appl., vol. 44, no. 11, pp. 23–26, 2012.
  8. N. Jose and C. K. A, “Data Security Model Enhancement In Cloud Environment,” vol. 10, no. 2, pp. 1–6, 2013.
  9. R. G. Saranya and A. Kousalya, “A Comparative Analysis of Security Algorithms Using Cryptographic Techniques in Cloud Computing,” vol. 8, no. 2, pp. 306–310, 2017.
  10. P. Mell and T. Grance, “The NIST definition of cloud computing: Recommendations of the National Institute of Standards and Technology,” Public Cloud Comput. Secur. Priv. Guidel., pp. 97–101, 2012.
  11. R. A. Bajad, M. Srivastava, and A. Sinha, “S m c c,” vol. 1, no. 2, pp. 8–19, 2012.
  12. M. R. Momeni, “A Survey of Mobile Cloud Computing : Advantages , Challenges and Approaches,” vol. 15, no. 4, pp. 14–28
  13. Gu, Qijun, and Mina Guirguis. “Secure mobile cloud computing and security issues.” In High Performance Cloud Auditing and Applications, pp. 65-90. Springer, New York, NY, 2014.
  14. S. Roy, S. Chatterjee, and A. K. Das, “On the Design of Provably Secure Lightweight Remote User Authentication Scheme for Mobile Cloud Computing Services,” vol. 5, 2017.
  15. T. Chithambaram and M. Durairaj, “Networks Security on Mobile Computing – A Survey,” vol. 6, no. 04, pp. 168–174, 2015.
  16. P. C. Mandal, “Evaluation of performance of the Symmetric Key Algorithms : DES , 3DES , AES and Blowfish,” J. Glob. Res. Comput. Sci., vol. 3, no. 8, pp. 67–70, 2012.
  17. Bhavya Shree M N, K S Ananda Kumar, Kavyashree S, Gagana H, S Geetha; Accessing Data In Cloud Platform Using Identity And Providing Strong Security, Auditing Based On IBDO Scheme; Global Journal of Engineering Science and Researches [ICRTCET-2018]; 2018, pp 54-61.
  18. Kandavel, N., and A. Kumaravel. “A Novel Royal Seal Cloudlet for Security Enhancement in Mobile Cloud Computing.” International Journal of Computer Science and Information Security (IJCSIS) 17, no. 1 (2019).
  19. Karthikeyan, B., T. Sasikala, and S. Baghavathi Priya. “Key exchange techniques based on secured energy efficiency in mobile cloud computing.” Applied Mathematics & Information Sciences 13, no. 6 (2019): 1039-1045.
  20. Sridhar, S., Smys, S. Hybrid RSAECC Based Secure Communication in Mobile Cloud Environment. Wireless Pers Commun 111, 429–442 (2020).  ttps://doi.org/10.1007/s11277-019-06867-0
  21. A. Inani, C. Verma and S. Jain, "A Machine Learning Algorithm TsF K-NN Based on Automated Data Classification for Securing Mobile Cloud Computing Model," 2019 IEEE 4th International Conference on Computer and Communication Systems (ICCCS), 2019, pp. 9-13, doi: 10.1109/CCOMS.2019.8821756.

Downloads

Published

2021-12-30

Issue

Section

Research Articles

How to Cite

[1]
Seada Abdu Wakene, Sisay Muleta Hababa, Gutema Seboka Daba, K S Ananda Kumar, " Data Storage Security in Mobile Cloud Computing (MCC) using Improved Blowfish Algorithm" International Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 7, Issue 6, pp.100-111, November-December-2021. Available at doi : https://doi.org/10.32628/CSEIT217620