T R A C K       P A P E R
ISSN:2394-3661 | Crossref DOI | SJIF: 5.138 | PIF: 3.854

International Journal of Engineering and Applied Sciences

(An ISO 9001:2008 Certified Online and Print Journal)

Cloud Security using Blowfish and Key Management Encryption Algorithm

( Volume 2 Issue 6,June 2015 ) OPEN ACCESS
Author(s):

B.Thimma Reddy, K.Bala Chowdappa, S.Raghunath Reddy

Abstract:

In the present days security is the major goal in all applications. For securing data in cloud computing there are lot of techniques available. Various disadvantages in cloud are like security, data protection, network security, privacy concerns and are also prone to a variety of attacks like Denial of Service, IP spoofing etc. To overcome these attacks, we can use authentication, authorization, access control and encryption techniques. A user can access cloud services as a utility service and begin to use them almost instantly. The fact that services are accessible any where any time lead to several risks. Some of the concerns are lack of confidentiality, integrity and authentication among the users of cloud and service providers. Main goal of my proposal is to provide security in cloud and protecting the data transmitted through various secure channels by providing security using encryption. The cryptographic algorithms like DES, AES, GOST 28147-89, CAST, RC6, SERPENT, and TWOFISH can be adopted for the optimization of data security in cloud computing.

Paper Statistics:

Total View : 875 | Downloads : 866 | Page No: 59-62 |

Cite this Article:
Click here to get all Styles of Citation using DOI of the article.