An Efficient Approach to Enhance Data Security in Cloud Using Recursive Blowfish Algorithm

Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 248)

Abstract

Cloud computing and Services have gained popularity both from industry and academia since both enable the rapid development of the distributed computing in areas of collaborative research and development, healthcare, grid-enabled applications, enterprise computing infrastructure, military applications and domestic Security. The existence of the Service providing system depends on the customer’s requirements. Software Engineering is one of the disciples which orients towards accomplishment of quality in technology thorough best principles and practices. Applying these software engineering quality attributes enables one to achieve customer satisfaction in cloud applications. Security which is one of the significant quality attributes is also deemed to be one of the biggest issues in cloud computing since it needs to be managed and control huge amount of data.

Cryptography is one of the popular methods of achieving data security, whose objective is to covert information from original form into unreadable form. Despite of advancement in technology and existence of various security models for realizing secured encryption process, there still prevail various security issues during data transfer. The objective of this paper is to enhance the Customers satisfaction by providing an improved level of security through reduced possibility for hacking through Blowfish algorithm by varying the number of rounds and decide the value of N, which is complex and confuses the hacker.

Keywords

Security Cryptography Software Quality Blowfish Customer satisfaction Non-functional requirement 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Balkish, N., Prasad, A.M., Suma, V., Vaidehi, M.: A Survey on factors influencing security in cloud. In: 10th International Conference on Advanced Computer Science and Information Technology (ACSIT), Chennai, India,Google Scholar
  2. 2.
    Balkish, N., Prasad, A.M., Suma, V.: Comparative Analysis of Cryptographic Algorithms for Better Utilization. In: 2nd International Conference on Recent Trends in Engineering Technology (ICRTET 2013), Bangalore, India (April 30, 2013)Google Scholar
  3. 3.
    Al Tamimi, A.-K.: Performance Analysis of Data Encryption AlgorithmsGoogle Scholar
  4. 4.
    Vaithiyanathan, V., Manikandan, G., Krishnan, G.: A novel approach to the performance and security enhancement using blowfish algorithm. Inter. J. Adv. Res. Comp. Sci. 1(4), 451–454 (2010)Google Scholar
  5. 5.
    Prasithsangaree, P., Krishnamurthy, P.: Analysis of Energy Consumption of RC4 and AES Algorithms in Wireless LANs. In: The Proceedings of the IEEE GLOBECOM 2003, pp. 1445–1449 (2003)Google Scholar
  6. 6.
    Manikandan, G., Sairam, N., Kamarasan, M.: A New Approach for Improving Data Security using Iterative Blowfish Algorithm. Research Journal of Applied Sciences, Engineering And Technology 4(6), 603–607 (2012) ISSN: 2040-7467Google Scholar
  7. 7.
    Seth, S.M., Mishra, R.: Comparative Analysis Of Encryption Algorithms For Data Communication. IJCST 2(2), 192–192 (2011)Google Scholar
  8. 8.
    Agrawal, M., Mishra, P.: A Comparative Survey on Symmetric Key Encryption Techniques. International Journal on Computer Science and Engineering (IJCSE) 4(5), 877–882 (2012)Google Scholar
  9. 9.
    Manikandan, G., Manikandan, R., SundarGanesh, G.: A New Approach for generating strong key in RC4 algorithm. J. Theory. Appl. Inf. Technol. 24(2), 113–119 (2011a)Google Scholar
  10. 10.
    Manikandan, G., Krishnan, G., Sairam, N.: A unified block and stream cipher based file Encryption. J. Global Res. Comp. Sci. 2(7), 53–57 (2011b)Google Scholar
  11. 11.
    Manikandan, G., Manikandan, R., Rajendiran, P., Krishnan, G., SundarGanesh, G.: An Integrated block and stream cipher approach for key Enhancement. J. Theory. Appl. Inf. Technol. 28(2), 83–87 (2011c)Google Scholar
  12. 12.
    Minaam, D.S.A., Abdual-Kader, H.M., Hadhoud, M.M.: Evaluating the Effects of Symmetric Cryptography Algorithms on Power Consumption for Different Data Types. International Journal of Network Security 11(2), 78–87 (September)Google Scholar
  13. 13.
    Zunnurhain, K., Vrbsky, S.: Security Attacks and Solutions in Clouds. In: 2nd IEEE International Conference on Cloud Computing Technology and Science, Indianapolis, USA, November 30-December (2010)Google Scholar
  14. 14.
    Suma, V., Deshpandey, B., Vaidehi, M., Gopalakrishnan Nair, T.R.: Cloud Computing for Microfinance. In: International Conference on Systemics, Cybernetics and Informatics (ICSCI 2012), Hyderabad, India Hyderabad, India, February 15-18 (2012)Google Scholar
  15. 15.
    Stallings, W.: Cryptography and Network Security Principles and Practices. Prentice Hall, New DelhiGoogle Scholar
  16. 16.
    Gopalakrishnan Nair, T.R., Suma, V.: Defect management using pair metrics, DI and IPM. Crosstalk, The Journal of Defense Software Engineering 24(6), 22–27 (2011)Google Scholar
  17. 17.
    Suma, V., Gopalakrishnan Nair, T.R.: Effective defect prevention approach in software process for achieving better quality levels. Paper presented at the Fifth International Conference on Software Engineering, Singapore (August 2008)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  1. 1.Computer Science and Engineering, Department of Information Science and EngineeringDayananda Sagar College of EngineeringBangaloreIndia
  2. 2.Department of CSEDayananda Sagar College of EngineeringBangaloreIndia
  3. 3.Research and Industry Incubation Centre (RIIC), Department of Information Science and EngineeringDayananda Sagar College of EngineeringBangaloreIndia

Personalised recommendations