A Modified Blowfish Algorithm for Improving the Cloud Security

Journal Title: Elysium Journal of Engineering Research and Management - Year 2016, Vol 4, Issue 3

Abstract

The accessing of sensitive information from the cloud database is done through the internet. To avoid the hacking number of privacy preservation mechanisms such as cryptography, attribute-based models are employed. The existing systems suffer from the linear increase in time complexity with respect to increasing in cipher text size, lack of scalability, improper security. To overwhelm this difficulty, a novel Blowfish algorithm is introduced in this paper. Advanced Encryption Standard (AES) technique used to encrypt and decrypts data to provide an enhanced security. This work provides better encryption rate in software, not providing effective cryptanalysis, provides security and flexibility and same key used for both encryption and decryption process. Whenever the user download the data, the key is essential to match for encryption key. If the key is unmatched the user can’t download the data. The experimental results evaluate the performance of the proposed blowfish algorithm in terms of security, efficiency, performance values and encryption.

Authors and Affiliations

Saranya V, Kavitha K

Keywords

Related Articles

A Statistical Pattern Recognition Approach for Tracking Left Ventricle Endocardium

The Left Ventricle endocardium has a difficult problem can be determined by a new statistical pattern recognition approach. In this pattern, resampling algorithm along with the current time step is estimated and appearan...

COMMUNITY DISCOVERY: COMPARITIVE SURVEY BETWEEN PAGE RANK, HITS, SALSA AND HEIGEN

his paper presents the comparative study of ranking algorithm such as PageRank, HITS, SALSA and Heigen. These algorithms share a common factor that is it finds the principal eigen vector. We experimented the...

Enhancement of Security and Usability Standards with a Novel Storage Optimized Honeyword Generation Approach

Among the modern security threats on password based authentication techniques, the brute force computation is the one that performs the inversion of hash values. Several technologies have been developed for the computati...

VIRTUAL MACHINE SECURITY SCHEME AGAINST CO-RESIDENT ATTACK IN CLOUD COMPUTING

Cloud computing provide users and enterprises with various capabilities to store and process their data. Cloud security refers to a broad set of policies, technologies and controls deploy to product data. H...

SMART HOME ENERGY MANAGEMENT SYSTEM USING RS485 NETWORK

Home Energy Management System (HEMS) (for information as effectively at home to the load equipment through the use of renewable energy Water heater, washing machine and the fan, etc.), and to regulate...

Download PDF file
  • EP ID EP365642
  • DOI -
  • Views 100
  • Downloads 0

How To Cite

Saranya V, Kavitha K (2016). A Modified Blowfish Algorithm for Improving the Cloud Security. Elysium Journal of Engineering Research and Management, 4(3), -. https://europub.co.uk/articles/-A-365642