Title: Optimal blowfish algorithm-based technique for data security in cloud

Authors: P. Dileep Kumar Reddy; R. Praveen Sam; C. Shoba Bindu

Addresses: Computer Science and Engineering, JNTUA College of Engineering, Ananthapuramu, India ' Computer Science and Engineering, G. Pulla Reddy Engineering College, Kurnool – 518002, India ' Computer Science and Engineering, JNTUA College of Engineering, Ananthapuramu – 515002, India

Abstract: The cloud computing has elegantly emerged as a unique category of computing which is invariably dependent on sharing computing resources reasonably possessing the local servers or personal devices to successfully address the applications. For the purpose of effectively overcoming the related issues, an optimal blowfish algorithm-based approach is envisioned for the effective encryption and decryption. In the relative step, an innovative signcryption algorithm is elegantly employed for signature authentication. The key manager is entrusted with the task of authenticating the policy related to the file. If the policy precisely corresponds to the file name, then an identical public key is created. If not, a new public key is generated and with the help of public key and private key, the file is encrypted and uploaded into the cloud. The proposed method provides higher security in terms of the data usage for individual persons.

Keywords: blowfish encryption algorithm; optimal blowfish algorithm; decryption; signcryption; cloud security; signature authentication; data security; cloud computing; cryptography; key management; public key generation.

DOI: 10.1504/IJBIDM.2016.081605

International Journal of Business Intelligence and Data Mining, 2016 Vol.11 No.2, pp.171 - 189

Received: 27 Jul 2016
Accepted: 23 Aug 2016

Published online: 17 Jan 2017 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article