Development of Blowfish Encryption Scheme for Secure Data Storage in Public and Commercial Cloud Computing Environment
By: Shafi'I, Muhammad Abdulhamid.
Contributor(s): Nafisat, Abubakar Sadiq.
Publisher: Tamil Nadu i-manager's 2018Edition: Vol.5(2), Jul-Dec.Description: 1-10p.Subject(s): Computer EngineeringOnline resources: Click here In: i-manager's journal on cloud computing (JCC)Summary: Cloud computing is defined as the delivery of on-demand computing resources ranging from infrastructure application to datacenter over the internet on a pay-per-use basis. Most cloud computing applications does not guarantee high level security, such as privacy, confidentiality, and integrity of data because of third-party transition. This brings the development of Blowfish cloud encryption system that enables them to encrypt their data before storage in the cloud. Blowfish encryption scheme is a symmetric block cipher used to encrypt and decrypt data. Microsoft Azure cloud server was used to test the proposed encryption system. Users are able to encrypt their data and obtain a unique identification to help them retrieve encrypted data from the cloud storage facility as and when needed.Item type | Current location | Call number | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|---|
Articles Abstract Database | School of Engineering & Technology Archieval Section | Not for loan | 2019879 |
Cloud computing is defined as the delivery of on-demand computing resources ranging from infrastructure application to datacenter over the internet on a pay-per-use basis. Most cloud computing applications does not guarantee high level security, such as privacy, confidentiality, and integrity of data because of third-party transition. This brings the development of Blowfish cloud encryption system that enables them to encrypt their data before storage in the cloud. Blowfish encryption scheme is a symmetric block cipher used to encrypt and decrypt data. Microsoft Azure cloud server was used to test the proposed encryption system. Users are able to encrypt their data and obtain a unique identification to help them retrieve encrypted data from the cloud storage facility as and when needed.
There are no comments for this item.