Gurbind Kaur, Bikramjeet Singh Bumrah
Abstract: In the cloud space different users provide their secret information on cloud environment or secure the information. In the purposed paper different approaches have been used for the security of the data. In this firstly the validation of the user has been done. In this the user want to access the data then firstly himself have to be provide username and secret key that has been transmitted via email on authorized mail address. The user cans upload and download data after the validation process get complete. In this user uploads its data and contents of the file has been extracted for encryption process. In the purposed approach RSA and BLOWFISH algorithm has been used for encryption of the data. In the purposed work key generator generates a private key and the RSA approach use the modules function to convert cipher text into plain text. After RSA on the cipher text the blowfish algorithm has been implemented that that reconvert the cipher text into the blowfish cipher text. After this the data can be stored on cloud and can be downloaded by authorized user. If any authorized user can be able to get secret data then due to encryption user will not be able to extract the information without decryption key.
Keywords: Cloud computing, Cloud security, Blow fish algorithm