CFP last date
20 May 2024
Reseach Article

Novel Approach of Cryptography by Hybridization of ECC and Diffie-Hellman with Blowfish Method in Cloud Environment

by Tanmaya Mahandru, Ramanjot Kaur
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 179 - Number 22
Year of Publication: 2018
Authors: Tanmaya Mahandru, Ramanjot Kaur
10.5120/ijca2018916422

Tanmaya Mahandru, Ramanjot Kaur . Novel Approach of Cryptography by Hybridization of ECC and Diffie-Hellman with Blowfish Method in Cloud Environment. International Journal of Computer Applications. 179, 22 ( Feb 2018), 41-44. DOI=10.5120/ijca2018916422

@article{ 10.5120/ijca2018916422,
author = { Tanmaya Mahandru, Ramanjot Kaur },
title = { Novel Approach of Cryptography by Hybridization of ECC and Diffie-Hellman with Blowfish Method in Cloud Environment },
journal = { International Journal of Computer Applications },
issue_date = { Feb 2018 },
volume = { 179 },
number = { 22 },
month = { Feb },
year = { 2018 },
issn = { 0975-8887 },
pages = { 41-44 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume179/number22/29003-2018916422/ },
doi = { 10.5120/ijca2018916422 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:56:10.763041+05:30
%A Tanmaya Mahandru
%A Ramanjot Kaur
%T Novel Approach of Cryptography by Hybridization of ECC and Diffie-Hellman with Blowfish Method in Cloud Environment
%J International Journal of Computer Applications
%@ 0975-8887
%V 179
%N 22
%P 41-44
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing is an emerging field in information technology field. It is growing very fast and provides the effective services to the users in every field. Cloud stores the data in huge amount on it and it is the main issue to handle the data with proper security. For providing the security to the cloud data many techniques are used by different service providers. In this paper we proposed the Hybrid Blow Fish algorithm combined with AES. Both the algorithms are encryption algorithm which provides the security to the user at sender end as well as receiver end.

References
  1. Li, Yibin, et al. "Intelligent cryptography approach for secure distributed big data storage in cloud computing." Information Sciences 387 (2017): 103-115.
  2. Xia, Zhihua, et al. "A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing." IEEE Transactions on Information Forensics and Security11.11 (2016): 2594-2608.
  3. Khari, Manju, and Manoj Kumar. "Secure data transference architecture for cloud computing using cryptography algorithms." Computing for Sustainable Global Development (INDIACom), 2016 3rd International Conference on. IEEE, 2016.
  4. Priyanka Ora and Dr.P.R.Pal, “Data Security and Integrity in Cloud Computing Based On RSA Partial Homomorphic and MD5 Cryptography” IEEE International Conference on Computer 2015.
  5. Shakeeba S. Khan , Prof.R.R. Tuteja, Security in Cloud Computing using Cryptographic Algorithms, Vol. 3, Issue 1, January 2015
  6. Prof Swarnalata Bollavarapu, Bharat Gupta, ‘Data Security in Cloud Computing’, Volume 4, Issue 3, March 2014
  7. NesrineKaaniche,AymenBoudguiga, Maryline Laurent, ”ID Based Cryptography for Secure Cloud Data Storage,”Cloud Computing (CLOUD), 2013 IEEE Sixth International Conference
  8. NehaTirthani, GanesanR,”Data Security in Cloud Architecture Based on diffie Hellman and Elliptical Curve Cryptography,” International Association for Cryptologic Research, Nov 2013.
  9. Mishra, Ankur, et al. "Cloud computing security." International Journal on Recent and Innovation Trends in Computing and Communication 1.1 (2013): 36-39.
  10. Rewagad, Prashant, and Yogita Pawar. "Use of digital signature with diffie hellman key exchange and AES encryption algorithm to enhance data security in cloud computing." Communication Systems and Network Technologies (CSNT), 2013 International Conference on. IEEE, 2013
  11. DeyanChen,Hong Zhao,” Data Security and Privacy Protection Issues in Cloud Computing, ” 2012 IEEE International Conference on Computer and Electronics engineering.
  12. Yu, Shucheng, Wnjing Lou, and Kui Ren. "Data security in cloud computing." Morgan Kaufmann/Elsevier, Book section 15 (2012): 389-410.
  13. Asma, Anjum, Mousmi Ajay Chaurasia, and Hala Mokhtar. "Cloud Computing Security Issues." International Journal of Application or Innovation in Engineering & Management 1.2 (2012): 141-147.
  14. Zissis, Dimitrios, and Dimitrios Lekkas. "Addressing cloud computing security issues." Future Generation computer systems 28.3 (2012): 583-592.
  15. Sudha, M., and M. Monica. "Enhanced security framework to ensure data security in cloud computing using cryptography." Advances in Computer Science and its Applications 1.1 (2012): 32-37.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Security Blowfish Algorithm AES ECDH.