Achieve Confidentiality and Authentication for Cloud Computing Using Hybrid Approach
Journal: International Journal for Scientific Research and Development | IJSRD (Vol.3, No. 12)Publication Date: 2016-03-01
Authors : Nikita Mehta; Khushboo Pawar;
Page : 287-291
Keywords : Encryption; Storage; Security; Blowfish algorithm;
Abstract
The security requirements for cloud computing providers begins with the same techniques and tools as for traditional data centers, which includes the application of a strong network security perimeter. Cloud computing servers use the same operating systems, enterprise and web applications as localized virtual machines and physical servers. Therefore, an attacker can remotely exploit vulnerabilities in these systems and applications. For security we apply blowfish algorithm on cloud store data. We also Modified blowfish algorithm and compare proposed algorithm with existing algorithm with different parameters like time and encryption time , decryption time, uploading and downloading time.
Other Latest Articles
- Multivariate Analysis for Underground Mine Worker's Accident Investigations
- Harmonic Reduction and Unity Power Factor by Using PWM Controlling In Dc Motor Load
- A Review on the Journey to OUTERNET
- THE ARCHETYPAL IMAGE OF WOMEN IN IBSEN'S A DOLL'S HOUSE AND PINTER'S THE HOMECOMING
- Some Issues for Construction and Maintenance of Roads in Afghanistan
Last modified: 2016-02-24 18:17:47