BDBC - Block-Chain Data Transmission Using Blowfish Security with Optimization in Cloud Network
Keywords:
Data Collection, Health Records, Encryption, Decryption, Blowfish, Unauthorized AccessAbstract
Massive health-related records are continually being produced and kept in heterogeneous networks due to the fast rise of cloud technologies and data collecting. Because of the enormous data collection through things and wearables, the network needs a secure processing platform to preserve all. These data are maintained and secured by various managing systems, protocols, and algorithms as well as hardware’s. We need to safeguard the data from illegal access with minimum resources. In proposed method, users and data proprietors will access the network through block chain and cloud technologies through the BDBC-block-chain data transmission using blowfish security with optimization in cloud network system. Before transmitting the data across blockchain to the cloud, the data proprietor encrypts it using the blowfish technique to protect from unauthorized entities and people.
Downloads
References
Fatimah Khalil Aljwari, “Challenges of Privacy in Cloud Computing”, Journal of Computer and Communications, 2022.
Deepak Putha, B. P. S. Sahoo, Sambit Mishra, and Satyabrata Swain, “Cloud Computing Features, Issues and Challenges: A Big Picture”, International Conference on Computational Intelligence & Networks, 2015.
Deepak Kumar Verma, and Tanya Sharma, “Issues and Challenges in Cloud Computing”, International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE), Vol. 8, Issue 4, April 2019.
Nidal M. Turab, Anas Abu Taleb Shadi, and R. Masadeh, “Issues and Challenges in Cloud Computing”, International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE), Vol. 8, Issue 4, April 2019.
Monjur Ahmed and Mohammad Ashraf Hossain, “Cloud Computing and Security Issues in the Cloud”, International Journal of Network Security & Its Applications (IJNSA), Vol.6, No.1, January 2014.
John Otieno Oredo, and James Njihia, “Challenges of Cloud Computing in Business: Towards New Organizational Competencies”, International Journal of Business and Social Science, Vol. 5 No. 3, March 2014.
Satyakam Rahul and Sharda, “Cloud Computing: Advantages and Security Challenges”, International Journal of Information and Computation Technology, Volume 3, Number 8, 2013.
Zunair Mahmood, and Waleed Iftikhar, “A study on Cloud Computing issues and challenges in higher education institutes of Middle EasternCountries”, International Journal of Creative Research Thoughts (IJCRT), Volume 6, Issue 2, April 2018.
Debabrata Nayak, “Understanding the Security, Privacy and Trust Challenges of Cloud Computing”, Journal of Cyber Security and Mobility, Vol. 1, 2012.
Moulika Bollinadi, and Vijay Kumar Damera, “Cloud Computing: Security Issues and Research Challenges”, Journal of Network Communications and Emerging Technologies (JNCET), Volume 7, Issue 11, November 2017.
Shaitan Singh Meena, and Dr. Satwinder Singh, “A Review on Security Challenges: Communication Level in Cloud Computing”, International Journal of Engineering Research & Technology (IJERT), 2016.
Talal H. Noor, Sherali Zeadally , Abdullah Alfazi , and Quan Z. Sheng, “Mobile cloud computing: Challenges and future research directions”, Journal of Network and Computer Applications,2018.
Communication Engineering (IJARCCE), Vol. 8, Issue 4, April 2019.
Monjur Ahmed and Mohammad Ashraf Hossain, “Cloud Computing and Security Issues in the Cloud”, International Journal of Network Security & Its Applications (IJNSA), Vol.6, No.1, January 2014.
John Otieno Oredo, and James Njihia, “Challenges of Cloud Computing in Business: Towards New Organizational Competencies”, International Journal of Business and Social Science, Vol. 5 No. 3, March 2014.
M. Rajendra Prasad, Jayadev Gyani, and P.R.K. Murti, “Mobile Cloud Computing: Implications and Challenges”, Journal of Information Engineering and Applications, Vol 2, No.7, 2012.
Satyakam Rahul and Sharda, “Cloud Computing: Advantages and Security Challenges”, International Journal of Information and Computation Technology, Volume 3, Number 8, 2013.
Subhashini, B., & Kavitha, V. (2011). A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications, 34(1), 1-11.
Sharma, V., & Kumar, A. (2014). Cloud computing security issues and solutions: A survey. International Journal of Computer Applications, 96(6), 37-43.
Alqahtani, S. M., & Alahmadi, H. A. (2019). Data security and privacy in cloud computing: A review on current standards, issues, and solutions. IEEE Access, 7, 73040-73057.
Awan, I., Owen, G., & Crosbie, M. (2014). Cloud computing: A review of the security issues and the solutions. International Journal of Information Management, 34(3), 365-376.
Jagadeesan, V., & Manickam, N. (2015). Security and privacy issues in cloud computing: A survey. Procedia Computer Science, 50, 1009-1014.
Wang, C., Zhang, Q., Ren, K., & Lou, W. (2010). Privacy-preserving public auditing for data storage security in cloud computing. In Proceedings of IEEE INFOCOM.
Subashini, S., & Kavitha, V. (2010). A survey on cloud computing security management. International Journal of Computer Applications, 1(10), 18-25.
Mather, T., Kumaraswamy, S., & Latif, S. (2009). Cloud security and privacy: An enterprise perspective on risks and compliance. O'Reilly Media, Inc.
Zhang, Q., Cheng, L., & Bout Aba, R. (2010). Cloud computing: state-of-the-art and research challenges. Journal of Internet Services and Applications, 1(1), 7-18.
Rittenhouse, J. W., & Ransome, J. F. (2016). Cloud computing: Implementation, management, and security. CRC Press.
Anand, R., Ahamad, S., Veeraiah, V., Janardan, S.K., Dhabliya, D., Sindhwani, N., Gupta, A. Optimizing 6G wireless network security for effective communication (2023) Innovative Smart Materials Used in Wireless Communication Technology, pp. 1-20.
Basaligheh, P. (2021). A Novel Multi-Class Technique for Suicide Detection in Twitter Dataset. Machine Learning Applications in Engineering Education and Management, 1(2), 13–20. Retrieved from http://yashikajournals.com/index.php/mlaeem/article/view/14
Ricci, A., Jankowski, M., Pedersen, A., Sánchez, F., & Oliveira, F. Predicting Engineering Student Success using Machine Learning Algorithms. Kuwait Journal of Machine Learning, 1(2). Retrieved from http://kuwaitjournals.com/index.php/kjml/article/view/118
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 Venkata Naga Rani Bandaru, P. Visalakshi
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.