Cloud Data Security by using Blowfish Algorithm

  • Unique Paper ID: 145576
  • PageNo: 375-378
  • Abstract:
  • Cloud computing has nice potential of providing sturdy procedure power to the society at reduced value. It enables customers with restricted procedure resources to source their giant computation workloads to the cloud, and economically relish the large procedure power, bandwidth, storage, and even applicable code which will be shared in a pay-per-use manner. Storing knowledge in a very third party’s cloud system causes serious concern over knowledge confidentiality. General encryption schemes defend knowledge confidentiality, however conjointly limit the practicality of the storage system as a result of many operations are supported over encrypted knowledge. Constructing a secure storage system that supports multiple functions is difficult once the storage system is distributed and has no central authority. We have a tendency to propose a threshold proxy re-encryption theme and integrate it with a localized erasure code specified a secure distributed storage system is developed. The distributed storage system not only supports secure and sturdy knowledge storage and retrieval, however conjointly lets a user forward his knowledge within the storage servers to another user while not retrieving the info back. The most technical contribution is that the proxy re-encryption theme supports encoding operations over encrypted messages yet as forwarding operations over encoded and encrypted messages. Our method totally integrates encrypting, encoding, and forwarding. We analyze and suggest appropriate parameters for the amount of copies of a message sent to storage servers and also the variety of storage servers queried by a key server.

Copyright & License

Copyright © 2026 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

BibTeX

@article{145576,
        author = {K.Manoj Kumar Reddy and G.Ananthnath},
        title = {Cloud Data Security by using Blowfish Algorithm},
        journal = {International Journal of Innovative Research in Technology},
        year = {},
        volume = {4},
        number = {10},
        pages = {375-378},
        issn = {2349-6002},
        url = {https://ijirt.org/article?manuscript=145576},
        abstract = {Cloud computing has nice potential of providing sturdy procedure power to the society at reduced value. It enables customers with restricted procedure resources to source their giant computation workloads to the cloud, and economically relish the large procedure power, bandwidth, storage, and even applicable code which will be shared in a pay-per-use manner. Storing knowledge in a very third party’s cloud system causes serious concern over knowledge confidentiality. General encryption schemes defend knowledge confidentiality, however conjointly limit the practicality of the storage system as a result of many operations are supported over encrypted knowledge. Constructing a secure storage system that supports multiple functions is difficult once the storage system is distributed and has no central authority. We have a tendency to propose a threshold proxy re-encryption theme and integrate it with a localized erasure code specified a secure distributed storage system is developed. The distributed storage system not only supports secure and sturdy knowledge storage and retrieval, however conjointly lets a user forward his knowledge within the storage servers to another user while not retrieving the info back. The most technical contribution is that the proxy re-encryption theme supports encoding operations over encrypted messages yet as forwarding operations over encoded and encrypted messages. Our method totally integrates encrypting, encoding, and forwarding. We analyze and suggest appropriate parameters for the amount of copies of a message sent to storage servers and also the variety of storage servers queried by a key server.},
        keywords = {Cloud computing, encryption, re-encryption, encoding},
        month = {},
        }

Cite This Article

Reddy, K. K., & G.Ananthnath, (). Cloud Data Security by using Blowfish Algorithm. International Journal of Innovative Research in Technology (IJIRT), 4(10), 375–378.

Related Articles