International Journal of Computer
Trends and Technology

Research Article | Open Access | Download PDF

Volume 67 | Issue 4 | Year 2019 | Article Id. IJCTT-V67I4P124 | DOI : https://doi.org/10.14445/22312803/IJCTT-V67I4P124

Security to the Cloud using RSA and Blowfish Algorithm


Rakshith N, Raushani Kumari, Srividya M S, Shreeraksha M R, Pratik Jha

Citation :

Rakshith N, Raushani Kumari, Srividya M S, Shreeraksha M R, Pratik Jha, "Security to the Cloud using RSA and Blowfish Algorithm," International Journal of Computer Trends and Technology (IJCTT), vol. 67, no. 4, pp. 124-127, 2019. Crossref, https://doi.org/10.14445/22312803/ IJCTT-V67I4P124

Abstract

Using a set of available services and resources through the internet is called cloud computing. Data centers located around the world provide the cloud services.In the past couple of years Cloud Computing has become an eminent part of the IT industry.As a result of its economic benefits more and more people are heading towards Cloud adoption.Cloud computing is characterized by on-demand selfservices, ubiquitous network accesses, resource pooling, elasticity, and measured services. The aforementioned characteristics of cloud computing make it a striking candidate for businesses, organizations, and individual users for adoption. Cloud Computing is today’s generation advanced technology services are made available for customers per utilization basis. Servers are being utilized on cloud to outsource their highly valuable data. Though there are many benefits of cloud computing, it has security threads of pivotal confidential data.In present times there are numerous Cloud Service providers (CSP) allowing customers to host their applications and data onto Cloud.As the field of technology seen a rapid growth in recent times, Security has been the major concern.The information might be personal or organizational data stored in the cloud is facing potential threat from hackers and there is need to identify the proper security.So the data stored in the cloud will be secure. In this paper we are providing security to the cloud data using RSA algorithm and also adding the salt using blowfish algorithm to provide extra security to the cloud data.Here we divide a file into fragments and provide security to each fragmented part and upload into the cloud in different buckets that ensures that even in case of successful attack no meaningful informationis revealed to the attacker.

Keywords

Cloud security, fragmentation, RSA, blowfish, buckets.

References

[1] DROPS: Division and Replication of Data in Cloud for Optimal Performance and Security Mazhar Ali, Student Member, IEEE, Kashif Bilal, Student Member, IEEE, Samee U. Khan, Senior Member, IEEE, BharadwajVeeravalli, Senior Member, IEEE, Keqin Li, Fellow, IEEE, and Albert Y. Zomaya, Fellow, IEEE. IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL. 6, NO. 2, APRIL-JUNE 2018.
[2] https://www.cloudcomputingnews.net/categories/hacking/
[3] https://ieeexplore.ieee.org/document/7943164/
[4] https://simple.m.wikipedia.org/wiki/RSA_algorithm
[5] https://www.schneier.com/academic/archives/1994/09/descrip tion_of_a_new.html
[6] https://www.schneier.com/academic/archives/1995/09/the_bl owfish_encrypt.html
[7] https://www.techopedia.com/definition/1779/hybridencryption
[8]https://www.academia.edu/33494330/Optimal_Performance_ and_Security_in_Cloud_Using_Division_and_Replication_of _Data