CFP last date
20 January 2025
Reseach Article

Hybrid Cryptosystem using Modified Blowfish Algorithm and SHA Algorithm on Public Cloud

by Aakash Gore, S. S. Meena, Preetesh Purohit
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 155 - Number 3
Year of Publication: 2016
Authors: Aakash Gore, S. S. Meena, Preetesh Purohit
10.5120/ijca2016912275

Aakash Gore, S. S. Meena, Preetesh Purohit . Hybrid Cryptosystem using Modified Blowfish Algorithm and SHA Algorithm on Public Cloud. International Journal of Computer Applications. 155, 3 ( Dec 2016), 6-10. DOI=10.5120/ijca2016912275

@article{ 10.5120/ijca2016912275,
author = { Aakash Gore, S. S. Meena, Preetesh Purohit },
title = { Hybrid Cryptosystem using Modified Blowfish Algorithm and SHA Algorithm on Public Cloud },
journal = { International Journal of Computer Applications },
issue_date = { Dec 2016 },
volume = { 155 },
number = { 3 },
month = { Dec },
year = { 2016 },
issn = { 0975-8887 },
pages = { 6-10 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume155/number3/26583-2016912275/ },
doi = { 10.5120/ijca2016912275 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:00:15.773111+05:30
%A Aakash Gore
%A S. S. Meena
%A Preetesh Purohit
%T Hybrid Cryptosystem using Modified Blowfish Algorithm and SHA Algorithm on Public Cloud
%J International Journal of Computer Applications
%@ 0975-8887
%V 155
%N 3
%P 6-10
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing has shaped the conceptual and infrastructural basis for tomorrow’s computing. The world-computing infrastructure is quickly moving towards cloud-based design. Whereas it's important to require benefits of cloud based computing by suggests that of deploying it in varied sectors, the security aspects during a cloud based computing environment remains at the core of interest. Cloud based services and service providers are being evolved, that has resulted in a new business trend supported Cloud Technology. With the introduction of various cloud based services and Geographically distributed cloud service providers, Store sensitive data usually in remote servers with the chances of being exposed to unauthorized parties. If security isn't robust and consistent, benefits that cloud computing have to provide will have little believability. This paper presents an approach, which is based on modified blowfish algorithm and SHA algorithm for the security purpose on the cloud environment.

References
  1. Viney Pal Bansal ,Sandeep Singh“A Hybrid Data Encryption Technique using RSA and Blowfish for Cloud Computing on FPGAs “RAECS UIET Panjab University Chandigarh 22nd December 2015 , 978-1-4673-8253-3/15/$31.00 ©2015 IEEE
  2. Gurjeevan Singh, Ashwani Kumar, K. S. Sandha ”A Study of New Trends in Blowfish Algorithm” ,International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 1, Issue 2, pp.321-326
  3. B.Thimma Reddy, K.BalaChowdappa, S.Raghunath Reddy “Cloud Security using Blowfish and Key Management Encryption Algorithm ”International Journal of Engineering and Applied Sciences (IJEAS) ISSN: 2394-3661, Volume-2, Issue-6, June 2015
  4. JasleenKaur, Dr. SushilGarg, “Security in Cloud Computing using Hybrid of Algorithms”,International Journal of Engineering Research and General Science Volume 3, Issue 5, September-October, 2015 ISSN 2091-2730.
  5. PriyankaOra , Dr.P.R.Pal “Data Security and Integrity in Cloud Computing Based On RSA Partial Homomorphic and MD5 Cryptography ” IEEE International Conference on Computer, Communication and Control (IC4-2015).
  6. Dr. VivekKapoor, Rahul Yadav, “A Hybrid Cryptography Technique to Support Cyber Security Infrastructure”, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 4 Issue 11, November 2015.
  7. B. Thimma Reddy, K. BalaChowdappa, S. Raghunath Reddy, “Cloud Security using Blowfish and Key Management Encryption Algorithm”, International Journal of Engineering and Applied Sciences (IJEAS) ISSN: 2394-3661, Volume-2, Issue-6, June 2015.
  8. Hazem M. El bakry, Ali E. Taki_El_Deen, Ahmed Hussein El tangy, “Implementation of a Hybrid Encryption Scheme for SMS / Multimedia Messages on Android”, International Journal of Computer Applications (0975 – 8887) Volume 85 – No 2, January 2014.
  9. AkhilBehl, “Emerging Security Challenges in Cloud Computing”, in Proc. of World Congress on Information and communication Technologies ,pp. 217-222, Dec. 2011.
  10. Srinivasarao D et al., “Analyzing the Superlative symmetric Cryptosystem Encryption Algorithm”, Journal of Global Research in Computer Science, vol. 7, Jul. 2011.
  11. TingyuanNie and Teng Zhang “A study of DES and Blowfish encryption algorithm‟, in Proc. IEEE Region 10 Conference, pp. 1-4 ,Jan. 2009.
  12. Jitendra Singh Yadav et al.,“ Modified RSA Public Key Cryptosystem Using Short Range Natural Number Algorithm” , International Journal of Advanced Research in Computer Science and Software Engineering ,vol. 2,Aug. 2012.
Index Terms

Computer Science
Information Sciences

Keywords

Hybrid Cryptosystem Cloud Security SHA Blowfish File Splitting.