Enhanced Blowfish Algorithm and EECC to Improve Cloud Storage Security

Authors

  • Thotakuri Srilekha Research Scholar, Dept. of Computer Science & Engg., Annamalai Univ
  • Vijay Bhanu S. Research Supervisor,Dept. of ComputerScience&Engg., Annamalai Univ
  • Niranjan P. Research Co-Supervisor, Dept. of CSE., Annamalai University

Keywords:

Cloud storage, Data Encryption, Data Privacy, Data Security, Encryption Key

Abstract

Several applications consist of huge volume of data associated to its function. Data handling is the major concern in all application which relies in internet, Cloud is feasible solution to store such data used in internet applications but the security is a big concern and its privacy, security parameters are also degraded when these data are placed in common private storage place. Generally numerous techniques of cryptography are being involved in securing those third party storage places but still it is integrity questionable. We have proposed a method named EBF-EECC (Enhanced Blowfish Algorithm –Enhanced Elliptic Curve Cryptography) for securing data as well as key. Key is encrypted separately by EECC and Data encrypted separately with the help of EBF. In addition with these techniques we deployed one more hash function along with EBF-EECC for concrete safety of the data pertaining to individual services in the cloud. Blowfish algorithm is still being used for securing the data in excellent manner with the help of Average size of the key, Number of rounds and the sizes of block and the same proved in our simulation. Elliptic curve cryptography is also considered in proposed method by taking their strong nature of key sizes considered with other algorithms like RSA to improve concrete security measurement on cloud data.

Downloads

Download data is not yet available.

References

Tannu, Karambir (2017) Enhancing data security in cloud using encryption techniques. Indian J Comput Sci Eng 8(3):280–283

Prabhu et.al., “Privacy preserving steganography based biometric authentication system for cloud computing environment”, Measurement: Sensors Journal, Vol 24, Dec 2022, https://doi.org/10.1016/j.measen.2022.100511

Handa K, Singh U (2015) Data security in cloud computing using encryption and steganography. Int J Comput Sci Mob Comput 4(5):786–791

Yunchuan Sun, Junsheng Zhang, Yongping Xiong, andGuangyu Zhu, Data Security and Privacy in Cloud Computing, Hindawi Publishing Corporation International Journal of Distributed Sensor Networks Volume 2014, Article ID 190903, 9 pages http://dx.doi.org/10.1155/2014/190903

Pon H, et.al., “Conceptual approach on smart car parking system for industry 4.0 internet of things assisted networks”, in Measurement: Sensors, Volume 24, December 2022, https://doi.org/10.1016/j.measen.2022.100474

J. Krumm, “A survey of computational location privacy,” Personal and Ubiquitous Computing, vol. 13, no. 6, pp. 391–399, 2009.

S. Chandra, S. Paira, S. S. Alam, and G. Sanyal, "A comparative survey of symmetric and asymmetric key cryptography," in 2014 international conference on electronics, communication and computational engineering (ICECCE), 2014: IEEE, pp. 83-93.

Hossein Abroshan, A Hybrid Encryption Solution to Improve Cloud Computing Security using Symmetric and Asymmetric Cryptography Algorithms, (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 12, No. 6, 2021

Neha MK (2016) Enhanced security using hybrid encryption algorithm. Int J Innov Res Comput Commun Eng 4(7):13001–13007

Salem MZ, Sabbeh SF, EL-Shishtawy T (2017) An efficient privacy preserving public auditing mechanism for secure cloud storage. Int J Appl Eng Res 12(6):1093–1101

Sajay, K.R., Babu, S.S. Enhancing the security of cloud data using hybrid encryption algorithm. J Ambient Intell Human Comput (2019). https://doi.org/10.1007/s12652-019-01403-1

Sumalatha Potteti, Namita Parati, Secured Data Transfer For Cloud Using Blowfish, International Journal of Advances In Computer Science and Cloud Computing, Volume- 3, Issue- 2, Nov-2015

C. Curino, E. Jones, P. C., Popa, R. A., Wu & N. Zeldovich, “Relational Cloud : A Database-as-a-Service for the Cloud Accessed Citable Link Relational Cloud : A Database-as-a-Service for the Cloud,” Information Applications, vol. 1, no. 1, 2011, pp. 0–6.

Shafi’i Muhammad Abdulhamid, Nafisat Abubakar Sadiq, Mohammed Abdullahi, Nadim Rana3, Haruna Chiroma, and Dada Emmanuel Gbenga, Development of Blowfish Encryption Scheme for Secure Data Storage in Public and Commercial Cloud Computing Environment, 2nd International Conference on Information and Communication Technology and Its Applications (ICTA 2018) Federal University of Technology, Minna, Nigeria September 5 – 6, 2018

Abdullah Th Abdalsatir, Mohammed Farooq Hamdi, Ali Noori Kareem, Data Security in Cloud by Using Blowfish Algorithm, International journal of scientific and Technology research ,ISSN 2319-8885 Vol.03,Issue.01, Pages:0158-0162, January-2014

B. Umapathy and D. Kalpana, "A Survey on Cryptographic Algorithm for Data Security in Cloud Storage Environment," European Journal of Molecular & Clinical Medicine, vol. 7, no. 09, 2020.

Thyagarajan C, et.al., “A Typical Analysis and Survey on Healthcare Cyber Security” in Int. Journal of Scientific and Technology Research, Vol.9, Issue.3, pp.3267-3270, 2020, ISSN: 2277-8616

Vijayalakshmi C, Florence, "A survey on solving dilemmas of adapting blockchain in different applications" 1st International Conference on Recent Advances in Manufacturing Engineering Research, ICRAMER 2021, AIP Conference Proceedings, 2460, 070011 (2022); https://doi.org/10.1063/5.0095701

Nivethitha Vijayaraj,Sivasubramanian Arunagiri, "Intensification and Interpretation of Performance in 5G Adopting Millimeter Wave: A Survey and Future Research Direction", The International Arab Journal of Information Technology (IAJIT) ,Volume 20, Number 04, pp. 600 - 608, July 2023, doi: 10.34028/iajit/20/4/6.

Neha Tirthani, and Ganesan R, Data Security in Cloud Architecture Based on Diffie Hellman and Elliptical Curve Cryptography, International Association for Cryptologic Research Cryptology,49, 2014.

Suthir S & Dr.S.Janakiraman, “Contemporary and efficient shared area network in Peer-to-Peer Communication”, International Conference on Radar, Communication and Computing, Proceeding of IEEE XPlore, pp. 38–42, 2012, https://doi.org/10.1109/ICRCC.2012.6450544

Archisman Ghosh . Comparison of Encryption Algorithms: AES, Blowfish and Twofish for Security of Wireless Networks, International Research Journal of Engineering and Technology, Vol:07 Iss:06,2020

Vijayaraj, N., Arunagiri, S. Demultiplexer design using photonic crystal ring resonator with high quality factor and less footprint for DWDM application. Opt Quant Electron 54, 465 (2022). https://doi.org/10.1007/s11082-022-03817-2

Srividya M, et.al., “A contemporary network security technique using smokescreen SSL in huddle network server”, 2nd International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB), Proceeding of IEEE XPlore, 2016, pp 673-676, https://doi.org/10.1109/AEEICB.2016.7538376

Nivethitha.V, M.Bhavithra – “Real Time Sectionalization of Enhanced Sharpness Video using FPGA” in Elysium Journal of Engineering Research and Management, Volume 3, Issue 4, Page No. 23 - 26, August-2016. ISSN: 2347-4408.

Wafaa A. N. A. AL-Nbhany, Ammar Zahary, A Comparative Study among Cryptographic Algorithms: Blowfish, AES and RSA, International Arab Conference on Information Technology.

Suthir S and Janakiraman S, “SNT Algorithm and DCS Protocols coalesced a Contemporary Hasty File Sharing with Network Coding Influence”, Journal of Engineering Research, Vol. 6, Issue 3, pp.54-69, 2018

Jayashri C, et.al., “Big Data Transfers through Dynamic and Load Balanced Flow on Cloud Networks”, 3rd IEEE International Conference on Advances in Electrical and Electronics, Information, Communication and Bio-Informatics, AEEICB 2017, Proceeding of IEEE XPlore, pp. 342–346, 2017, https://doi.org/10.1109/AEEICB.2016.7538376.

Dr.S.Janakiraman, et.al., May-2017. “A Survey of Fast File Sharing System in Network” in International Journal of Engineering Development and Research, Vol. 5, Issue: 2, May 2017, pp. 1298-1304, ISSN: 2321-9939, https://zenodo.org/record/583721

Taha Junaid, et.al., “A comparative analysis of transformer based models for figurative language classification”, Computers and Electrical Engineering, vol. 101, July 2022, https://doi.org/10.1016/j.compeleceng.2022.108051

Krishnamurthy A, Kumar B,” The Repaschine: A Robot to Analyze and Repair Roads Using Cutting-Edge Technologies, EAI/Springer Innovations in Communication and Computing, pp. 249–254, 2021, https://doi.org/10.1007/978-3-030-49795-8_24

Prabhu D, et.al., “Design of Multiple Share Creation with Optimal Signcryption based Secure Biometric Authentication System for Cloud Environment”,International Journal of Computers and Applns., 2022, 44(11), pp. 1047–1055, https://doi.org/10.1080/1206212X.2022.2103890

Elumalaivasan et.al.,” CBIR- Retreival of Images using Median Vector Algorithm”, International Conference on Green Computing, Communication and Conservation of Energy, ICGCE 2013, Proceeding of IEEE XPlore, pp. 1–5, 2013, https://doi.org/10.1109/ICGCE.2013.6823389

Singh, S. ., Bharti, A. K. ., Pandey, H. ., Yadav, R. K. Sharma, D. ., & Shanker, N. (2023). Towards Automated and Optimized Security Orchestration in Cloud SLA. International Journal on Recent and Innovation Trends in Computing and Communication, 11(3), 215–222. https://doi.org/10.17762/ijritcc.v11i3.6339

Chaudhary, D. S. ., & Sivakumar, D. S. A. . (2022). Detection Of Postpartum Hemorrhaged Using Fuzzy Deep Learning Architecture . Research Journal of Computer Systems and Engineering, 3(1), 29–34. Retrieved from https://technicaljournals.org/RJCSE/index.php/journal/article/view/38

Soundararajan, R., Stanislaus, P.M., Ramasamy, S.G., Dhabliya, D., Deshpande, V., Sehar, S., Bavirisetti, D. P. Multi-Channel Assessment Policies for Energy-Efficient Data Transmission in Wireless Underground Sensor Networks (2023) Energies, 16 (5), art. no. 2285,

Downloads

Published

21.09.2023

How to Cite

Srilekha, T. ., Bhanu S., V. ., & P., N. . (2023). Enhanced Blowfish Algorithm and EECC to Improve Cloud Storage Security . International Journal of Intelligent Systems and Applications in Engineering, 11(4), 256–262. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/3519

Issue

Section

Research Article

Similar Articles

You may also start an advanced similarity search for this article.