banner

Blowfish based encryption model in real cloud environment

Rubika Walia, Prachi Garg, Manish Kumar

Abstract


The introduction of the internet has made security a top anxiety. And the preceding of security permits for improved knowledge in the creation of security tools. Several concerns about safekeeping might have arisen just from the way the internet was set up. Many businesses use firewalls and encryption techniques to protect themselves online. Businesses can design an “intranet” that is protected from potential risks while being linked to the internet. For increased security, better encryption techniques are needed to retain data integrity. For better encryption, it is essential to consider into explanation a few of issues, including key size, chunk size, and encoding ratio. Documents transferred to subordinate storage strategies (such as Hard disk or SD card) must be encrypted to provide security and prevent unwanted access. If a key is kept on secondary storage with the document, it is quite simple to decrypt it. It is desirable to create encryption keys from operator passwords when encoding or decoding the folder rather than keeping the key together with the document.

Keywords


advance encryption system; secure hash algorithm; federal information processing standard; national institute of standards and technology

Full Text:

PDF

References


1. Kumar N, Thakur J, Kalia A. Performance analysis of symmetric key cryptography algorithms: DES, AES and Blowfish. An International Journal of Engineering Sciences 2011; 4: 28–37.

2. Goyal S. A survey on the applications of cryptography. International Journal of Science and Technology 2012; 2(3): 352–355.

3. Mathur A. A research paper: An ASCII value based data encryption algorithm and its comparison with other symmetric data encryption algorithms. International Journal on Computer Science and Engineering (IJCSE) 2012; 4(9): 1650–1657.

4. Ismil IA, Galal-Edeen GH, Khattab S, et al. Performance examination of AES encryption algorithm with constant and dynamic rotation. International Journal of Reviews in Computing 2012; 12: 18–29.

5. Dave KC, Parmar SK. A review on various most common symmetric encryptions algorithms. International Journal for Scientific Research & Development 2013; 1(4): 1015–1018.

6. Pahal R, Kumar V. Efficient implementation of AES. International Journal of Advanced Research in Computer Science and Software Engineering 2013; 3(7): 290–295.

7. Rakholiya KR, Kathiriya D. Efficient black-box collision search in cryptanalysis. Paripex-Indian Journal of Research 2013; 2(1): 30–31.

8. Sandhu GS, Verma V. Comparing popular symmetric key algorithms using various performance metrics. International Journal of Advance Research in Computer Science and Management Studies 2013; 1(7): 394–399.

9. Sumitra. Comparative analysis of AES and DES security algorithms. International Journal of Scientific and Research Publications 2013; 3(1): 1–5.

10. Manjesh KN, Karunavathi RK. Secured high throughput implementation of AES Algorithm. International Journal of Advanced Research in Computer Science and Software Engineering 2013; 3(5): 1193–1198.

11. Lalitha N, Manimegalai P, Muthukumar VP, Santha M. Efficient data hiding by using AES & advance hill cipher algorithm. International Journal of Research in Computer Applications and Robotics 2014; 2(1): 1–13.

12. Acharya K, Sajwan M, Bhargava S. Analysis of cryptographic algorithms for network security. International Journal of Computer Applications Technology and Research 2014; 3(2): 130–135.

13. Al Hamid HA, Rahman SMM, Hossain MS, et al. A security model for preserving the privacy of medical big data in a healthcare cloud using a fog computing facility with pairing-based cryptography. IEEE Access 2017; 5: 22313–22328. doi: 10.1109/ACCESS.2017.2757844

14. Qadir AM, Varol N. A review paper on cryptography. In: 2019 7th International Symposium on Digital Forensics and Security (ISDFS); 10–12 June 2019; Barcelos, Portugal.

15. Gupta RK. A review paper on concepts of cryptography and cryptographic hash function. European Journal of Molecular & Clinical Medicine 2020; 7(7): 3397–3408.

16. Verma J, Shahrukh M, Krishna M, Goel R. A critical review on cryptography and hashing algorithm SHA-512. International Research Journal of Modernization in Engineering Technology and Science 2021; 3(12): 1760–1764.

17. Oberoi N, Sachdeva S, Garg P, Walia R. Dynamic extraction and analytics of big data from cloud and social media integrated platforms. Advances in Mathematics: Scientific Journal 2020; 9(6): 3703–3711. doi: 10.37418/amsj.9.6.48

18. Walia R, Garg P. Cryptography: Analysis of SYN and UDP attacks using wire shark. In: 2021 2nd International Conference on Computational Methods in Science & Technology (ICCMST); 17–18 December 2021; Mohali, India.

19. Walia R, Garg P. Key management scheme for cloud integrated Internet of Things. In: 2023 International Conference on Artificial Intelligence and Smart Communication (AISC); 27–29 January 2023; Greater Noida, India. pp. 1067–1071.




DOI: https://doi.org/10.32629/jai.v6i3.695

Refbacks

  • There are currently no refbacks.


Copyright (c) 2023 Rubika Walia, Prachi Garg, Manish Kumar

License URL: https://creativecommons.org/licenses/by-nc/4.0