ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Achieve Confidentiality and Authentication for Cloud Computing Using Hybrid Approach

Journal: International Journal for Scientific Research and Development | IJSRD (Vol.3, No. 12)

Publication Date:

Authors : ; ;

Page : 287-291

Keywords : Encryption; Storage; Security; Blowfish algorithm;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

The security requirements for cloud computing providers begins with the same techniques and tools as for traditional data centers, which includes the application of a strong network security perimeter. Cloud computing servers use the same operating systems, enterprise and web applications as localized virtual machines and physical servers. Therefore, an attacker can remotely exploit vulnerabilities in these systems and applications. For security we apply blowfish algorithm on cloud store data. We also Modified blowfish algorithm and compare proposed algorithm with existing algorithm with different parameters like time and encryption time , decryption time, uploading and downloading time.

Last modified: 2016-02-24 18:17:47