Performance Analysis of Modified Blowfish Algorithm towards Cloud Security
Journal: International Journal of Computer Science and Mobile Applications IJCSMA (Vol.5, No. 10)Publication Date: 2017-10-30
Authors : K.Kavitha;
Page : 219-229
Keywords : information-centric networking; attribute-based encryption; blowfish algorithm; advanced encryption technique;
Abstract
The accessing of sensitive information from the cloud database is done through the internet. To avoid the hacking number of privacy preservation mechanisms such as cryptography, attribute-based models are employed. The existing systems suffer from the linear increase in time complexity with respect to increasing in cipher text size, lack of scalability, improper security. To overwhelm this difficulty, a novel Blowfish algorithm is introduced in this paper. Advanced Encryption Standard (AES) technique used to encrypt and decrypts data to provide an enhanced security. This work provides better encryption rate in software, not providing effective cryptanalysis, provides security and flexibility and same key used for both encryption and decryption process. Whenever the user download the data, the key is essential to match for encryption key. If the key is unmatched the user can't download the data. The experimental results evaluate the performance of the proposed blowfish algorithm in terms of security, efficiency, performance values and encryption.
Other Latest Articles
- DISABILITY AND THE USE OF ICT IN EDUCATION: DO STUDENTS WITH SPECIAL NEEDS RECOGNISE THE SUPPORT GIVEN BY TEACHERS WHEN USING TECHNOLOGY
- EFFECT OF TRACK POSITION ON STUDENTS’ ATTITUDE TOWARDS SCIENCE
- LEARNING ENVIRONMENT EFFECT AND USE OF TECHNOLOGY IN THE STUDY OF ENGLISH LANGUAGE
- DIAGNOSTIC OF INFORMATION AND COMMUNICATION TECHNOLOGIES’ USE IN VOCATIONAL GUIDANCE: ANALYSIS OF AN EXPERIENCE
- RESEARCHING SCIENCE TEACHER PEDAGOGICAL CONTENT KNOWLEDGE
Last modified: 2017-11-11 17:47:55