Enhanced Blowfish Algorithm and EECC to Improve Cloud Storage Security
Keywords:
Cloud storage, Data Encryption, Data Privacy, Data Security, Encryption KeyAbstract
Several applications consist of huge volume of data associated to its function. Data handling is the major concern in all application which relies in internet, Cloud is feasible solution to store such data used in internet applications but the security is a big concern and its privacy, security parameters are also degraded when these data are placed in common private storage place. Generally numerous techniques of cryptography are being involved in securing those third party storage places but still it is integrity questionable. We have proposed a method named EBF-EECC (Enhanced Blowfish Algorithm –Enhanced Elliptic Curve Cryptography) for securing data as well as key. Key is encrypted separately by EECC and Data encrypted separately with the help of EBF. In addition with these techniques we deployed one more hash function along with EBF-EECC for concrete safety of the data pertaining to individual services in the cloud. Blowfish algorithm is still being used for securing the data in excellent manner with the help of Average size of the key, Number of rounds and the sizes of block and the same proved in our simulation. Elliptic curve cryptography is also considered in proposed method by taking their strong nature of key sizes considered with other algorithms like RSA to improve concrete security measurement on cloud data.
Downloads
References
Tannu, Karambir (2017) Enhancing data security in cloud using encryption techniques. Indian J Comput Sci Eng 8(3):280–283
Prabhu et.al., “Privacy preserving steganography based biometric authentication system for cloud computing environment”, Measurement: Sensors Journal, Vol 24, Dec 2022, https://doi.org/10.1016/j.measen.2022.100511
Handa K, Singh U (2015) Data security in cloud computing using encryption and steganography. Int J Comput Sci Mob Comput 4(5):786–791
Yunchuan Sun, Junsheng Zhang, Yongping Xiong, andGuangyu Zhu, Data Security and Privacy in Cloud Computing, Hindawi Publishing Corporation International Journal of Distributed Sensor Networks Volume 2014, Article ID 190903, 9 pages http://dx.doi.org/10.1155/2014/190903
Pon H, et.al., “Conceptual approach on smart car parking system for industry 4.0 internet of things assisted networks”, in Measurement: Sensors, Volume 24, December 2022, https://doi.org/10.1016/j.measen.2022.100474
J. Krumm, “A survey of computational location privacy,” Personal and Ubiquitous Computing, vol. 13, no. 6, pp. 391–399, 2009.
S. Chandra, S. Paira, S. S. Alam, and G. Sanyal, "A comparative survey of symmetric and asymmetric key cryptography," in 2014 international conference on electronics, communication and computational engineering (ICECCE), 2014: IEEE, pp. 83-93.
Hossein Abroshan, A Hybrid Encryption Solution to Improve Cloud Computing Security using Symmetric and Asymmetric Cryptography Algorithms, (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 12, No. 6, 2021
Neha MK (2016) Enhanced security using hybrid encryption algorithm. Int J Innov Res Comput Commun Eng 4(7):13001–13007
Salem MZ, Sabbeh SF, EL-Shishtawy T (2017) An efficient privacy preserving public auditing mechanism for secure cloud storage. Int J Appl Eng Res 12(6):1093–1101
Sajay, K.R., Babu, S.S. Enhancing the security of cloud data using hybrid encryption algorithm. J Ambient Intell Human Comput (2019). https://doi.org/10.1007/s12652-019-01403-1
Sumalatha Potteti, Namita Parati, Secured Data Transfer For Cloud Using Blowfish, International Journal of Advances In Computer Science and Cloud Computing, Volume- 3, Issue- 2, Nov-2015
C. Curino, E. Jones, P. C., Popa, R. A., Wu & N. Zeldovich, “Relational Cloud : A Database-as-a-Service for the Cloud Accessed Citable Link Relational Cloud : A Database-as-a-Service for the Cloud,” Information Applications, vol. 1, no. 1, 2011, pp. 0–6.
Shafi’i Muhammad Abdulhamid, Nafisat Abubakar Sadiq, Mohammed Abdullahi, Nadim Rana3, Haruna Chiroma, and Dada Emmanuel Gbenga, Development of Blowfish Encryption Scheme for Secure Data Storage in Public and Commercial Cloud Computing Environment, 2nd International Conference on Information and Communication Technology and Its Applications (ICTA 2018) Federal University of Technology, Minna, Nigeria September 5 – 6, 2018
Abdullah Th Abdalsatir, Mohammed Farooq Hamdi, Ali Noori Kareem, Data Security in Cloud by Using Blowfish Algorithm, International journal of scientific and Technology research ,ISSN 2319-8885 Vol.03,Issue.01, Pages:0158-0162, January-2014
B. Umapathy and D. Kalpana, "A Survey on Cryptographic Algorithm for Data Security in Cloud Storage Environment," European Journal of Molecular & Clinical Medicine, vol. 7, no. 09, 2020.
Thyagarajan C, et.al., “A Typical Analysis and Survey on Healthcare Cyber Security” in Int. Journal of Scientific and Technology Research, Vol.9, Issue.3, pp.3267-3270, 2020, ISSN: 2277-8616
Vijayalakshmi C, Florence, "A survey on solving dilemmas of adapting blockchain in different applications" 1st International Conference on Recent Advances in Manufacturing Engineering Research, ICRAMER 2021, AIP Conference Proceedings, 2460, 070011 (2022); https://doi.org/10.1063/5.0095701
Nivethitha Vijayaraj,Sivasubramanian Arunagiri, "Intensification and Interpretation of Performance in 5G Adopting Millimeter Wave: A Survey and Future Research Direction", The International Arab Journal of Information Technology (IAJIT) ,Volume 20, Number 04, pp. 600 - 608, July 2023, doi: 10.34028/iajit/20/4/6.
Neha Tirthani, and Ganesan R, Data Security in Cloud Architecture Based on Diffie Hellman and Elliptical Curve Cryptography, International Association for Cryptologic Research Cryptology,49, 2014.
Suthir S & Dr.S.Janakiraman, “Contemporary and efficient shared area network in Peer-to-Peer Communication”, International Conference on Radar, Communication and Computing, Proceeding of IEEE XPlore, pp. 38–42, 2012, https://doi.org/10.1109/ICRCC.2012.6450544
Archisman Ghosh . Comparison of Encryption Algorithms: AES, Blowfish and Twofish for Security of Wireless Networks, International Research Journal of Engineering and Technology, Vol:07 Iss:06,2020
Vijayaraj, N., Arunagiri, S. Demultiplexer design using photonic crystal ring resonator with high quality factor and less footprint for DWDM application. Opt Quant Electron 54, 465 (2022). https://doi.org/10.1007/s11082-022-03817-2
Srividya M, et.al., “A contemporary network security technique using smokescreen SSL in huddle network server”, 2nd International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB), Proceeding of IEEE XPlore, 2016, pp 673-676, https://doi.org/10.1109/AEEICB.2016.7538376
Nivethitha.V, M.Bhavithra – “Real Time Sectionalization of Enhanced Sharpness Video using FPGA” in Elysium Journal of Engineering Research and Management, Volume 3, Issue 4, Page No. 23 - 26, August-2016. ISSN: 2347-4408.
Wafaa A. N. A. AL-Nbhany, Ammar Zahary, A Comparative Study among Cryptographic Algorithms: Blowfish, AES and RSA, International Arab Conference on Information Technology.
Suthir S and Janakiraman S, “SNT Algorithm and DCS Protocols coalesced a Contemporary Hasty File Sharing with Network Coding Influence”, Journal of Engineering Research, Vol. 6, Issue 3, pp.54-69, 2018
Jayashri C, et.al., “Big Data Transfers through Dynamic and Load Balanced Flow on Cloud Networks”, 3rd IEEE International Conference on Advances in Electrical and Electronics, Information, Communication and Bio-Informatics, AEEICB 2017, Proceeding of IEEE XPlore, pp. 342–346, 2017, https://doi.org/10.1109/AEEICB.2016.7538376.
Dr.S.Janakiraman, et.al., May-2017. “A Survey of Fast File Sharing System in Network” in International Journal of Engineering Development and Research, Vol. 5, Issue: 2, May 2017, pp. 1298-1304, ISSN: 2321-9939, https://zenodo.org/record/583721
Taha Junaid, et.al., “A comparative analysis of transformer based models for figurative language classification”, Computers and Electrical Engineering, vol. 101, July 2022, https://doi.org/10.1016/j.compeleceng.2022.108051
Krishnamurthy A, Kumar B,” The Repaschine: A Robot to Analyze and Repair Roads Using Cutting-Edge Technologies, EAI/Springer Innovations in Communication and Computing, pp. 249–254, 2021, https://doi.org/10.1007/978-3-030-49795-8_24
Prabhu D, et.al., “Design of Multiple Share Creation with Optimal Signcryption based Secure Biometric Authentication System for Cloud Environment”,International Journal of Computers and Applns., 2022, 44(11), pp. 1047–1055, https://doi.org/10.1080/1206212X.2022.2103890
Elumalaivasan et.al.,” CBIR- Retreival of Images using Median Vector Algorithm”, International Conference on Green Computing, Communication and Conservation of Energy, ICGCE 2013, Proceeding of IEEE XPlore, pp. 1–5, 2013, https://doi.org/10.1109/ICGCE.2013.6823389
Singh, S. ., Bharti, A. K. ., Pandey, H. ., Yadav, R. K. Sharma, D. ., & Shanker, N. (2023). Towards Automated and Optimized Security Orchestration in Cloud SLA. International Journal on Recent and Innovation Trends in Computing and Communication, 11(3), 215–222. https://doi.org/10.17762/ijritcc.v11i3.6339
Chaudhary, D. S. ., & Sivakumar, D. S. A. . (2022). Detection Of Postpartum Hemorrhaged Using Fuzzy Deep Learning Architecture . Research Journal of Computer Systems and Engineering, 3(1), 29–34. Retrieved from https://technicaljournals.org/RJCSE/index.php/journal/article/view/38
Soundararajan, R., Stanislaus, P.M., Ramasamy, S.G., Dhabliya, D., Deshpande, V., Sehar, S., Bavirisetti, D. P. Multi-Channel Assessment Policies for Energy-Efficient Data Transmission in Wireless Underground Sensor Networks (2023) Energies, 16 (5), art. no. 2285,
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.