Springer Nature is making SARS-CoV-2 and COVID-19 research free. View research | View latest news | Sign up for updates

Implementation of enhanced blowfish algorithm in cloud environment

  • 26 Accesses


In the recent years, increase in the mobile devices and cloud processing the data stored in the cloud in the form of pictures, messages and texts. Cloud service providers cannot trust entirely to authorize the services used by the clients. For enhancing the security in the cloud, new cyber security model is introduced with optimal key selection. In this k-medoid clustering algorithm is used to cluster the information which is secret. It is based on the data distance measure. The data is encrypted and stored in the cloud using blowfish encryption. To improve the accuracy improved dragonfly algorithm is used.

This is a preview of subscription content, log in to check access.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7


  1. Al-Assam H, Hassan W, Zeadally S (2019) Automated biometric authentication with cloud computing. In: Biometric-based physical and cybersecurity systems. Springer, pp 455–475

  2. Algarni A (2019) A survey and classification of security and privacy research in smart healthcare systems. IEEE Access

  3. Ali M, Dhamotharan R, Khan E, Khan SU, Vasilakos AV, Li K et al (2015) SeDaSC: secure data sharing in clouds. IEEE Syst J 11:395–404

  4. Arora VK, Sharma V, Sachdeva M (2019) ACO optimized self-organized tree based energy balance algorithm for wireless sensor network. J Ambient Intell Hum Comput 10:4963–4975. https://doi.org/10.1007/s12652-019-01186-5

  5. Aujla GS, Chaudhary R, Kumar N, Das AK, Rodrigues JJ (2018) SecSVA: secure storage, verification, and auditing of big data in the cloud environment. IEEE Commun Mag 56:78–85

  6. Beulah S, Dhanaseelan FR (2016) Survey on security issues and existing solutions in cloud storage. Indian J Sci Technol 9:13

  7. Chauhan A, Gupta J (2017) A novel technique of cloud security based on hybrid encryption by blowfish and MD5. In: 2017 4th International conference on signal processing, computing and control (ISPCC), pp 349–355

  8. Fan Y, Liu S, Tan G, Lin X, Zhao G, Bai J (2018) One secure access scheme based on trusted execution environment. In: 2018 17th IEEE international conference on trust, security and privacy in computing and communications/12th IEEE international conference on big data science and engineering (TrustCom/BigDataSE), pp 16–21

  9. Gaur A, Jain A, Verma A (2017) Analyzing storage and time delay by hybrid blowfish-Md5 technique. In: 2017 International conference on energy, communication, data analytics and soft computing (ICECDS), pp 2985–2990

  10. Kumar N, Dash D (2019) Flow based efficient data gathering in wireless sensor network using path-constrained mobile sink. J Ambient Intell Hum Comput. https://doi.org/10.1007/s12652-019-01245-x

  11. Kumari S, Karuppiah M, Das AK, Li X, Wu F, Kumar N (2018) A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers. J Supercomput 74:6428–6453

  12. Li Y, Gai K, Qiu L, Qiu M, Zhao H (2017) Intelligent cryptography approach for secure distributed big data storage in cloud computing. Inf Sci 387:103–115

  13. Li P, Li J, Huang Z, Gao C-Z, Chen W-B, Chen K (2018) Privacy-preserving outsourced classification in cloud computing. Clust Comput 21:277–286

  14. Mudepalli S, Rao VS, Kumar RK (2017) An efficient data retrieval approach using blowfish encryption on cloud ciphertext retrieval in cloud computing. In: 2017 International conference on intelligent computing and control systems (ICICCS), pp 267–271

  15. Nie T, Song C, Zhi X (2010) Performance evaluation of DES and blowfish algorithms. In: 2010 International conference on biomedical engineering and computer science, pp 1–4

  16. Sadiq NA, Abdullahi M, Rana N, Chiroma H, Dada EG (2018) Development of blowfish encryption scheme for secure data storage in public and commercial cloud computing environment. i-Manag J Cloud Comput 5:1

  17. Schneider J, Harvan M, Schlegel R, Obermeier S, Locher T (2018) Encryption scheme using multiple parties. Google Patents

  18. Singh M, Soni SK (2019) Fuzzy based novel clustering technique by exploiting spatial correlation in wireless sensor. J Ambient Intell Hum Comput 10:1361–1378. https://doi.org/10.1007/s12652-018-0900-6

  19. Thangapandiyan M, Anand PR, Sankaran KS (2018) Quantum key distribution and cryptography mechanisms for cloud data security. In: 2018 International conference on communication and signal processing (ICCSP), pp 1031–1035

  20. Timothy DP, Santra AK (2017) A hybrid cryptography algorithm for cloud computing security. In: 2017 International conference on microelectronic devices, circuits and systems (ICMDCS), pp 1–5

  21. Wan Z, Liu JE, Deng RH (2011) HASBE: a hierarchical attribute-based solution for flexible and scalable access control in cloud computing. IEEE Trans Inform Forensics Secur 7:743–754

  22. Wang S, Zhou J, Liu JK, Yu J, Chen J, Xie W (2016) An efficient file hierarchy attribute-based encryption scheme in cloud computing. IEEE Trans Inf Forensics Secur 11:1265–1277

  23. Xiong H, Zhang H, Sun J (2018) Attribute-based privacy-preserving data sharing for dynamic groups in cloud computing. IEEE Syst J. https://doi.org/10.1109/JSYST.2018.2865221

  24. Yan Z, Wang M, Li Y, Vasilakos AV (2016) Encrypted data management with deduplication in cloud computing. IEEE Cloud Comput 3:28–35

  25. Yong P, Wei Z, Feng X, Dai Z-H, Yang G, Chen D-Q (2012) Secure cloud storage based on cryptographic techniques. J China Univ Posts Telecommun 19:182–189

Download references


This work is done as a part of PhD work.


No funding is provided.

Author information

Correspondence to Venkata Koti Reddy Gangireddy.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Gangireddy, V.K.R., Kannan, S. & Subburathinam, K. Implementation of enhanced blowfish algorithm in cloud environment. J Ambient Intell Human Comput (2020). https://doi.org/10.1007/s12652-020-01765-x

Download citation


  • Wireless communication
  • Security
  • Privacy and trust
  • Advanced network architecture
  • Blowfish encryption
  • Optimal key selection
  • IDA
  • Communication