HYBRIDIZATION OF RSA AND BLOWFISH CRYPTOGRAPHY ALGORITHMS FOR DATA SECURITY ON CLOUD STORAGE

Authors

  • Isiaka O.S. Department of Computer Science, Institute of Information and Communication Technology, Kwara State Polytechnic, Ilorin-Nigeria
  • Murtala K. Department of Computer Science, Institute of Information and Communication Technology, Kwara State Polytechnic, Ilorin-Nigeria
  • Ibraheem A.F. Department of Mass Communication, Institute of Information and Communication Technology, Kwara State Polytechnic, Ilorin-Nigeria
  • Bolaji-Adetoro D.F. Department of Computer Science, Institute of Information and Communication Technology, Kwara State Polytechnic, Ilorin-Nigeria

DOI:

https://doi.org/10.29121/ijetmr.v6.i12.2019.471

Keywords:

Cryptography, Blowfish Algorithm, Cloud Storage, Data Security, Symmetric Algorithm, Asymmetric Algorithm

Abstract

Security is provided for data according to the requirements of client. Cloud computing provides different types of services. Apart from the advantages of cloud, it has many security related issues. The topmost challenge in cloud is data security. There are more possibilities that the data are accessed by the other users of cloud storage. Data security must be addressed in the cloud storage. Cryptography is the most known technique for securing the data by encryption. It is necessary to propose encryption techniques which are suitable for cloud storage. Every cloud computing provides the different level of security. The aim of this study is to improve on the security of data or file stored on cloud storage using hybrid cryptographic algorithms for encryption. The algorithms are designed in such a way that one authenticates the authorized user and the other provides confidentiality and security for data stored on cloud.

Downloads

Download data is not yet available.

References

Aayushi P., Rana Y.K. and Patel B.P. (2015). “Design and Implementation of an Algorithm to Enhance Cloud Security”. International Journal of Computer Applications (0975 – 8887) volume 113 – No. 12.

Buyya R. et al. (2011). “Introduction to Cloud Computing”. Cloud Computing Principles and Paradigms. John Wiley & Sons. DOI: https://doi.org/10.1002/9780470940105

Fortine M., Michael K. and George O. (2017). “Enhanced Secure Data Storage in Cloud Computing Using Hybrid Cryptographic Techniques (AES and Blowfish)”. International Journal of Science and Research (IJSR), Volume 6 Issue 3. Available on www.ijsr.net, accessed on 23/10/2019.

Jasleen K. and Sushil G. (2015). “Security in Cloud Computing using Hybrid of Algorithms”. International Journal of Engineering Research and General Science Volume 3, Issue 5. Avaialable online at www.ijergs.org, accessed on 2/11/2019.

Manikandan G. et al (2011). “A Hybrid Approach for Security Enhancement by Modified Crypto-Stegno Scheme”. European Journal of Scientific Research, vol. 2, pp 206 – 212.

Mukhopadhyay D. (2013). “Enhanced Security for Cloud Storage using File Encryption”. Proc. International Conference on Distributed Computing and Internet Technologies.

Ramalingam S. and Sharmila B.S. (2015). “Symmetric Encryption Algorithm to Secure Outsourced Data in Public Cloud Storage”. Indian Journal of Science and Technology, Vol 8 (23), D OI: 10.17485/ ijst/ 2015/ v8i23/ 79210. Available online on www.indjst.org, accessed on 25/10/2019.

Rimal B. et al. (2009). “A Taxonomy and Survey of Cloud Computing Systems”. Proc. Fifth International Joint Conference on INC, IMS and IDS, pp: 44 – 51, held at Korea.

Swathi B. andBhaludra R.S. (2017). “Secure File Storage in Cloud Computing Using Hybrid Cryptography Algorithm”. International Journal of Advance Research in Science and Engineering, volume No. 06, Issue No. 11 pp 70 – 77. Available online at www.ijarse.com, accessed on 2/11/2019.

Downloads

Published

2019-12-31

How to Cite

Isiaka O.S., Murtala K., Ibraheem A.F., & Bolaji-Adetoro D.F. (2019). HYBRIDIZATION OF RSA AND BLOWFISH CRYPTOGRAPHY ALGORITHMS FOR DATA SECURITY ON CLOUD STORAGE . International Journal of Engineering Technologies and Management Research, 6(12), 29–34. https://doi.org/10.29121/ijetmr.v6.i12.2019.471