Enhancing Data Storage Security in Cloud Using Cryptography

Authors

  • Ms. Shivani B. Nimje Computer Science and Technology St. Vincent Pallotti College of engineering and technology, Nagpur, India.
  • Prof. M. B. Gudadhe Computer Science and Technology St. Vincent Pallotti College of engineering and technology, Nagpur, India.

Keywords:

Blowfish, RSA, Cryptography, Encryption, Decryption

Abstract

In the field of cloud computing, data security is of paramount importance. For safe data storage, a variety of encryption algorithms are available, each with its own set of benefits and drawbacks. In identity-based encryption, there is a difficulty with the key escrow and certificate revocation. Personality-based encryption does not require a secure intermediary. The key escrow and certificate revocation issues will be solved using the certificate-less encryption technique. In certificate less encryption, the responsibility of key generation is split between the cloud and the client. The Blowfish and RSA algorithms will be implemented to establish whether the algorithm has outstanding speed, both algorithms will be analyzed and compared in terms of encryption and decryption speed. When compared to alternative symmetric algorithms, the Blowfish algorithm was chosen because of its better speed. The RSA algorithm is chosen because it is faster than the other asymmetric algorithms. Calculate how fast the techniques' encryption and decryption processes are with the identical key length and message characters. Time is measured ten times, then the average figure is taken to produce a consistent result. As our data input environment in Python, we used characters, and based on that, we came to some conclusions. The result of this study is that the blowfish method is faster than RSA when it comes to encrypting or decrypting data. Methods of encryption and decryption will be used to hide and reveal the number of characters. 

References

Asassfeh, Mahmoud & Qatawneh, Mohammad & Alazzeh, Feras. (2018). Performance Evaluation of Blowfish Algorithm on Supercomputer IMAN1. International journal of Computer Networks & Communications. 10. 43-53. 10.5121/ijcnc.2018.10205.

Nie, T., Song, C. and Zhi, X., 2010, April. Performance evaluation of DES and Blowfish algorithms. In Biomedical Engineering and Computer Science (ICBECS), 2010 International Conference on (pp. 1-4). IEEE.

Gatliff, B., 2003. Encrypting data with the Blowfish algorithm. Embedded Systems Programming, 16(8), pp.28-35.

Schneier, B., 1993, December. Description of a new variable-length key, 64-bit block cipher (Blowfish). In International Workshop on Fast Software Encryption (pp. 191-204). Springer, Berlin, Heidelberg.

Oukili, S. and Bri, S., 2016. High Throughput Parallel Implementation of Blowfish Algorithm. Applied Mathematics & Information Sciences, 10(6), pp.2087-2092.

H. Galli, ―International Journal of Advanced Research in Computer Science and Software Engineering Data Security in Cloud using Hybrid Encryption and Decryption,‖ vol. 3, no. 10, pp. 494– 497, 2013.

K. Aggarwal, ―Performance Evaluation of RC6 , Blowfish , DES , IDEA , CAST-128 Block Ciphers,‖ vol. 68, no. 25, pp. 10–16, 2013.

Ramesh, Archana, and A. Suruliandi. "Performance analysis of encryption algorithms for Information Security." Circuits, Power and Computing Technologies (ICCPCT), 2013 International Conference on. IEEE, 2013.

Downloads

Published

30-06-2022

How to Cite

Ms. Shivani B. Nimje, & Prof. M. B. Gudadhe. (2022). Enhancing Data Storage Security in Cloud Using Cryptography. International Journal for Research Publication and Seminar, 13(2), 239–245. Retrieved from https://jrps.shodhsagar.com/index.php/j/article/view/597

Issue

Section

Original Research Article

Most read articles by the same author(s)