Security to the Cloud using RSA and Blowfish Algorithm

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2019 by IJCTT Journal
Volume-67 Issue-4
Year of Publication : 2019
Authors : Rakshith N, Raushani Kumari, Srividya M S, Shreeraksha M R, Pratik Jha
DOI :  10.14445/22312803/IJCTT-V67I4P124

MLA

MLA Style:Rakshith N, Raushani Kumari, Srividya M S, Shreeraksha M R, Pratik Jha"Security to the Cloud using RSA and Blowfish Algorithm" International Journal of Computer Trends and Technology 67.4 (2019): 124-127.

APA Style:Rakshith N, Raushani Kumari, Srividya M S, Shreeraksha M R, Pratik Jha (2019). Security to the Cloud using RSA and Blowfish Algorithm International Journal of Computer Trends and Technology, 67(4), 124-127.

Abstract
Using a set of available services and resources through the internet is called cloud computing. Data centers located around the world provide the cloud services.In the past couple of years Cloud Computing has become an eminent part of the IT industry.As a result of its economic benefits more and more people are heading towards Cloud adoption.Cloud computing is characterized by on-demand selfservices, ubiquitous network accesses, resource pooling, elasticity, and measured services. The aforementioned characteristics of cloud computing make it a striking candidate for businesses, organizations, and individual users for adoption. Cloud Computing is today’s generation advanced technology services are made available for customers per utilization basis. Servers are being utilized on cloud to outsource their highly valuable data. Though there are many benefits of cloud computing, it has security threads of pivotal confidential data.In present times there are numerous Cloud Service providers (CSP) allowing customers to host their applications and data onto Cloud.As the field of technology seen a rapid growth in recent times, Security has been the major concern.The information might be personal or organizational data stored in the cloud is facing potential threat from hackers and there is need to identify the proper security.So the data stored in the cloud will be secure. In this paper we are providing security to the cloud data using RSA algorithm and also adding the salt using blowfish algorithm to provide extra security to the cloud data.Here we divide a file into fragments and provide security to each fragmented part and upload into the cloud in different buckets that ensures that even in case of successful attack no meaningful informationis revealed to the attacker.

Reference
[1] DROPS: Division and Replication of Data in Cloud for Optimal Performance and Security Mazhar Ali, Student Member, IEEE, Kashif Bilal, Student Member, IEEE, Samee U. Khan, Senior Member, IEEE, BharadwajVeeravalli, Senior Member, IEEE, Keqin Li, Fellow, IEEE, and Albert Y. Zomaya, Fellow, IEEE. IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL. 6, NO. 2, APRIL-JUNE 2018.
[2] https://www.cloudcomputingnews.net/categories/hacking/
[3] https://ieeexplore.ieee.org/document/7943164/
[4] https://simple.m.wikipedia.org/wiki/RSA_algorithm
[5] https://www.schneier.com/academic/archives/1994/09/descrip tion_of_a_new.html
[6] https://www.schneier.com/academic/archives/1995/09/the_bl owfish_encrypt.html
[7] https://www.techopedia.com/definition/1779/hybridencryption
[8] https://www.academia.edu/33494330/Optimal_Performance_ and_Security_in_Cloud_Using_Division_and_Replication_of _Data

Keywords
Cloud security, fragmentation, RSA, blowfish, buckets.