Enhancing Data Security of Data on Rest in Cloud using RSA and BLOWFISH Algorithm
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Views: 128 , Downloads: 115 | CTR: 90 %

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 10, October 2015

Enhancing Data Security of Data on Rest in Cloud using RSA and BLOWFISH Algorithm

Gurbind Kaur, Bikramjeet Singh Bumrah

In the cloud space different users provide their secret information on cloud environment or secure the information. In the purposed paper different approaches have been used for the security of the data. In this firstly the validation of the user has been done. In this the user want to access the data then firstly himself have to be provide username and secret key that has been transmitted via email on authorized mail address. The user cans upload and download data after the validation process get complete. In this user uploads its data and contents of the file has been extracted for encryption process. In the purposed approach RSA and BLOWFISH algorithm has been used for encryption of the data. In the purposed work key generator generates a private key and the RSA approach use the modules function to convert cipher text into plain text. After RSA on the cipher text the blowfish algorithm has been implemented that that reconvert the cipher text into the blowfish cipher text. After this the data can be stored on cloud and can be downloaded by authorized user. If any authorized user can be able to get secret data then due to encryption user will not be able to extract the information without decryption key.

Keywords: Cloud computing, Cloud security, Blow fish algorithm

Edition: Volume 4 Issue 10, October 2015

Pages: 1106 - 1110

Share this Article

How to Cite this Article?

Gurbind Kaur, Bikramjeet Singh Bumrah, "Enhancing Data Security of Data on Rest in Cloud using RSA and BLOWFISH Algorithm", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB158912, Volume 4 Issue 10, October 2015, 1106 - 1110

128 PDF Views | 115 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Cloud computing'

Views: 201 , Downloads: 173 | CTR: 86 %

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

Views: 122 , Downloads: 96 | CTR: 79 % | Weekly Popularity: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2242 - 2246

Efficient and Secure Auditing of Cloud Data with Key -Updating

Niranjana S, Manjusha M S

Share this Article

Views: 151 , Downloads: 97 | CTR: 64 % | Weekly Popularity: ⮙3

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2483 - 2487

Accountability of Data usage in Cloud Computing

Nitin P. Doiphode, Hemlata Channe

Share this Article

Views: 151 , Downloads: 97 | CTR: 64 % | Weekly Popularity: ⮙5

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1939 - 1946

An Approach for Video Compression Technique for Efficient Data Backup and Recovery in Public Cloud

Nagaraj S Kolhar, Dr. Suvarna Nandyal

Share this Article

Views: 134 , Downloads: 97 | CTR: 72 % | Weekly Popularity: ⮙3

Review Papers, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021

Pages: 594 - 596

A Review of Replication Strategies to Increase Data Availability for Data Intensive Applications in Cloud

K. Sreelatha

Share this Article

Similar Articles with Keyword 'Cloud security'

Views: 142 , Downloads: 99 | CTR: 70 %

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1845 - 1848

A Cloud Storage System for Preserving Privacy and Data Integrity of User

M. S. Tore, S. K. Sonkar

Share this Article

Views: 173 , Downloads: 100 | CTR: 58 % | Weekly Popularity: ⮙2

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 735 - 737

Survey Paper on Alleviation of Cloud Internal Denial of Service Attacks

Nikhita Nerkar, Vina M Lomte

Share this Article

Views: 137 , Downloads: 104 | CTR: 76 % | Weekly Popularity: ⮙3

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2619 - 2622

Information Security in Multi-Cloud Environment

Digambar D. Patil, Megha Singh

Share this Article

Views: 130 , Downloads: 104 | CTR: 80 % | Weekly Popularity: ⮙3

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2369 - 2372

Multi-Level Complex Key Sharing For Secure Access and Authorization on Cloud Platforms

Jaskarandeep Punia, Rajesh Kumar Bawa

Share this Article

Views: 128 , Downloads: 104 | CTR: 81 %

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1695 - 1698

Trusted Framework for Secured Information Storage over Cloud Environment

P. Pothuraju, Dasari Rajesh

Share this Article
Top