BDBC - Block-Chain Data Transmission Using Blowfish Security with Optimization in Cloud Network

Authors

  • Venkata Naga Rani Bandaru Research Scholar, Department of Networking and Communications, College of Engineering and Technology, SRM Institute of Science and Technology, Kattankulathur, India
  • P. Visalakshi Assistant Professor, Department of Networking and Communications, College of Engineering and Technology, SRM Institute of Science and Technology, Kattankulathur, India

Keywords:

Data Collection, Health Records, Encryption, Decryption, Blowfish, Unauthorized Access

Abstract

Massive health-related records are continually being produced and kept in heterogeneous networks due to the fast rise of cloud technologies and data collecting. Because of the enormous data collection through things and wearables, the network needs a secure processing platform to preserve all. These data are maintained and secured by various managing systems, protocols, and algorithms as well as hardware’s. We need to safeguard the data from illegal access with minimum resources. In proposed method, users and data proprietors will access the network through block chain and cloud technologies through the BDBC-block-chain data transmission using blowfish security with optimization in cloud network system. Before transmitting the data across blockchain to the cloud, the data proprietor encrypts it using the blowfish technique to protect from unauthorized entities and people.

Downloads

Download data is not yet available.

References

Fatimah Khalil Aljwari, “Challenges of Privacy in Cloud Computing”, Journal of Computer and Communications, 2022.

Deepak Putha, B. P. S. Sahoo, Sambit Mishra, and Satyabrata Swain, “Cloud Computing Features, Issues and Challenges: A Big Picture”, International Conference on Computational Intelligence & Networks, 2015.

Deepak Kumar Verma, and Tanya Sharma, “Issues and Challenges in Cloud Computing”, International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE), Vol. 8, Issue 4, April 2019.

Nidal M. Turab, Anas Abu Taleb Shadi, and R. Masadeh, “Issues and Challenges in Cloud Computing”, International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE), Vol. 8, Issue 4, April 2019.

Monjur Ahmed and Mohammad Ashraf Hossain, “Cloud Computing and Security Issues in the Cloud”, International Journal of Network Security & Its Applications (IJNSA), Vol.6, No.1, January 2014.

John Otieno Oredo, and James Njihia, “Challenges of Cloud Computing in Business: Towards New Organizational Competencies”, International Journal of Business and Social Science, Vol. 5 No. 3, March 2014.

Satyakam Rahul and Sharda, “Cloud Computing: Advantages and Security Challenges”, International Journal of Information and Computation Technology, Volume 3, Number 8, 2013.

Zunair Mahmood, and Waleed Iftikhar, “A study on Cloud Computing issues and challenges in higher education institutes of Middle EasternCountries”, International Journal of Creative Research Thoughts (IJCRT), Volume 6, Issue 2, April 2018.

Debabrata Nayak, “Understanding the Security, Privacy and Trust Challenges of Cloud Computing”, Journal of Cyber Security and Mobility, Vol. 1, 2012.

Moulika Bollinadi, and Vijay Kumar Damera, “Cloud Computing: Security Issues and Research Challenges”, Journal of Network Communications and Emerging Technologies (JNCET), Volume 7, Issue 11, November 2017.

Shaitan Singh Meena, and Dr. Satwinder Singh, “A Review on Security Challenges: Communication Level in Cloud Computing”, International Journal of Engineering Research & Technology (IJERT), 2016.

Talal H. Noor, Sherali Zeadally , Abdullah Alfazi , and Quan Z. Sheng, “Mobile cloud computing: Challenges and future research directions”, Journal of Network and Computer Applications,2018.

Communication Engineering (IJARCCE), Vol. 8, Issue 4, April 2019.

Monjur Ahmed and Mohammad Ashraf Hossain, “Cloud Computing and Security Issues in the Cloud”, International Journal of Network Security & Its Applications (IJNSA), Vol.6, No.1, January 2014.

John Otieno Oredo, and James Njihia, “Challenges of Cloud Computing in Business: Towards New Organizational Competencies”, International Journal of Business and Social Science, Vol. 5 No. 3, March 2014.

M. Rajendra Prasad, Jayadev Gyani, and P.R.K. Murti, “Mobile Cloud Computing: Implications and Challenges”, Journal of Information Engineering and Applications, Vol 2, No.7, 2012.

Satyakam Rahul and Sharda, “Cloud Computing: Advantages and Security Challenges”, International Journal of Information and Computation Technology, Volume 3, Number 8, 2013.

Subhashini, B., & Kavitha, V. (2011). A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications, 34(1), 1-11.

Sharma, V., & Kumar, A. (2014). Cloud computing security issues and solutions: A survey. International Journal of Computer Applications, 96(6), 37-43.

Alqahtani, S. M., & Alahmadi, H. A. (2019). Data security and privacy in cloud computing: A review on current standards, issues, and solutions. IEEE Access, 7, 73040-73057.

Awan, I., Owen, G., & Crosbie, M. (2014). Cloud computing: A review of the security issues and the solutions. International Journal of Information Management, 34(3), 365-376.

Jagadeesan, V., & Manickam, N. (2015). Security and privacy issues in cloud computing: A survey. Procedia Computer Science, 50, 1009-1014.

Wang, C., Zhang, Q., Ren, K., & Lou, W. (2010). Privacy-preserving public auditing for data storage security in cloud computing. In Proceedings of IEEE INFOCOM.

Subashini, S., & Kavitha, V. (2010). A survey on cloud computing security management. International Journal of Computer Applications, 1(10), 18-25.

Mather, T., Kumaraswamy, S., & Latif, S. (2009). Cloud security and privacy: An enterprise perspective on risks and compliance. O'Reilly Media, Inc.

Zhang, Q., Cheng, L., & Bout Aba, R. (2010). Cloud computing: state-of-the-art and research challenges. Journal of Internet Services and Applications, 1(1), 7-18.

Rittenhouse, J. W., & Ransome, J. F. (2016). Cloud computing: Implementation, management, and security. CRC Press.

Anand, R., Ahamad, S., Veeraiah, V., Janardan, S.K., Dhabliya, D., Sindhwani, N., Gupta, A. Optimizing 6G wireless network security for effective communication (2023) Innovative Smart Materials Used in Wireless Communication Technology, pp. 1-20.

Basaligheh, P. (2021). A Novel Multi-Class Technique for Suicide Detection in Twitter Dataset. Machine Learning Applications in Engineering Education and Management, 1(2), 13–20. Retrieved from http://yashikajournals.com/index.php/mlaeem/article/view/14

Ricci, A., Jankowski, M., Pedersen, A., Sánchez, F., & Oliveira, F. Predicting Engineering Student Success using Machine Learning Algorithms. Kuwait Journal of Machine Learning, 1(2). Retrieved from http://kuwaitjournals.com/index.php/kjml/article/view/118

Downloads

Published

24.11.2023

How to Cite

Rani Bandaru, V. N. ., & Visalakshi, P. . (2023). BDBC - Block-Chain Data Transmission Using Blowfish Security with Optimization in Cloud Network. International Journal of Intelligent Systems and Applications in Engineering, 12(5s), 370–378. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/3899

Issue

Section

Research Article