Research Paper | Computer Science & Engineering | India | Volume 4 Issue 10, October 2015
Enhancing Data Security of Data on Rest in Cloud using RSA and BLOWFISH Algorithm
Gurbind Kaur, Bikramjeet Singh Bumrah
In the cloud space different users provide their secret information on cloud environment or secure the information. In the purposed paper different approaches have been used for the security of the data. In this firstly the validation of the user has been done. In this the user want to access the data then firstly himself have to be provide username and secret key that has been transmitted via email on authorized mail address. The user cans upload and download data after the validation process get complete. In this user uploads its data and contents of the file has been extracted for encryption process. In the purposed approach RSA and BLOWFISH algorithm has been used for encryption of the data. In the purposed work key generator generates a private key and the RSA approach use the modules function to convert cipher text into plain text. After RSA on the cipher text the blowfish algorithm has been implemented that that reconvert the cipher text into the blowfish cipher text. After this the data can be stored on cloud and can be downloaded by authorized user. If any authorized user can be able to get secret data then due to encryption user will not be able to extract the information without decryption key.
Keywords: Cloud computing, Cloud security, Blow fish algorithm
Edition: Volume 4 Issue 10, October 2015
Pages: 1106 - 1110
How to Cite this Article?
Gurbind Kaur, Bikramjeet Singh Bumrah, "Enhancing Data Security of Data on Rest in Cloud using RSA and BLOWFISH Algorithm", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB158912, Volume 4 Issue 10, October 2015, 1106 - 1110
98 PDF Views | 87 PDF Downloads
Similar Articles with Keyword 'Cloud computing'
Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018
Pages: 81 - 84Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey
Priyanka H, Dr. Mary Cherian
Review Papers, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021
Pages: 594 - 596A Review of Replication Strategies to Increase Data Availability for Data Intensive Applications in Cloud
K. Sreelatha
Research Paper, Computer Science & Engineering, India, Volume 2 Issue 8, August 2013
Pages: 71 - 73Cloud Computing and Its Types in Mobile Network
Palak Jain
Research Paper, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013
Pages: 315 - 318Cloud Computing - A Birds Eye View
S.Kalaiselvi, S.V.Revathi
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020
Pages: 1028 - 1031Secure and Efficient Item Information Retrieval in Cloud Computing
Dr. Shameem Akther, Tahseen Begum
Similar Articles with Keyword 'Cloud security'
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 2619 - 2622Information Security in Multi-Cloud Environment
Digambar D. Patil, Megha Singh
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 735 - 737Survey Paper on Alleviation of Cloud Internal Denial of Service Attacks
Nikhita Nerkar, Vina M Lomte
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 1845 - 1848A Cloud Storage System for Preserving Privacy and Data Integrity of User
M. S. Tore, S. K. Sonkar
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1259 - 1361Security Service Model for Cloud Environment
Shafali Gupta, Neha R Gedam
Review Papers, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 2369 - 2372Multi-Level Complex Key Sharing For Secure Access and Authorization on Cloud Platforms
Jaskarandeep Punia, Rajesh Kumar Bawa