Secured Cryptosystem using Blowfish and RSA Algorithm for the Data in Public Cloud
G. Sathish Kumar1, K. Premalatha2, N. Aravindhraj3, M. Nivaashini4, M. Karthiga5
1Mr. G. Sathish Kumar, Assistant Professor, Department of Computer Science and Engineering, Bannari Amman Institute of Technology Sathyamangalam, Erode (Tamil Nadu), India.
2Dr. K. Premalatha, Professor, Department of Computer Science and Engineering, Bannari Amman Institute of Technology, Sathyamangalam, Erode (Tamil Nadu), India.
3Mr. N. Aravindhraj, Assistant Professor, Department of Computer Science and Engineering, Bannari Amman Institute of Technology, Athyamangalam, Erode (Tamil Nadu), India.
4Ms. M. Nivaashini, Assistant Professor, Department of Computer Science and Engineering, Bannari Amman Institute of Technology Sathyamangalam, Erode (Tamil Nadu), India.
5M. Karthiga, Department of Computer Science and Engineering, Bannari Amman Institute of Technology Sathyamangalam, Erode (Tamil Nadu), India.
Manuscript received on 10 December 2018 | Revised Manuscript received on 29 December 2018 | Manuscript Published on 09 January 2019 | PP: 45-49 | Volume-7 Issue-4S November 2018 | Retrieval Number: E1867017519/19©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Data Security makes the finest importance in the area of cloud computing. Cryptosystem will provide the greater security for the data in the cloud. Many encryption techniques are available for secured data storage with its own advantages and disadvantages. There is a problem of Key escrow and certificate revocation in the identity based encryption. Personality based encryption is free from security mediator. The certificate less encryption technique will overcome the key escrow issue and the certificate revocation issue. The task of key production is shared between the cloud and client in the certificateless encryption. In the proposed framework, the data holder encodes the data utilizing his/her secret key. Following that the information holder encode the secret key twice to frame a intermediate key. At that point he/she will send this encoded information and middle of the road keys to the cloud. The cloud will unscramble the middle of the road key in part and send the mostly decoded key and scrambled information to the planned beneficiary. The client will decode again the somewhat decoded information which is sent by the cloud and the client will get the required key for decoding with the goal that the client can decode it totally. The information holder can send similar information to numerous customers with least expense.
Keywords: Blowfish, Cryptography, Cloud, Security, Encryption.
Scope of the Article: Algorithm Engineering