Journal articles on the topic 'Blowfish Privacy'

To see the other types of publications on this topic, follow the link: Blowfish Privacy.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 46 journal articles for your research on the topic 'Blowfish Privacy.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Liu, Jiaxiang, Karl Knopf, Yiqing Tan, Bolin Ding, and Xi He. "Catch a blowfish alive." Proceedings of the VLDB Endowment 14, no. 12 (July 2021): 2859–62. http://dx.doi.org/10.14778/3476311.3476363.

Full text
Abstract:
Policy-aware differential privacy (DP) frameworks such as Blowfish privacy enable more accurate query answers than standard DP. In this work, we build the first policy-aware DP system for interactive data exploration, BlowfishDB, that aims to (i) provide bounded and flexible privacy guarantees to the data curators of sensitive data and (ii) support accurate and efficient data exploration by data analysts. However, the specification and processing of customized privacy policies incur additional performance cost, especially for datasets with a large domain. To address this challenge, we propose dynamic Blowfish privacy which allows for the dynamic generation of smaller privacy policies and their data representations at query time. BlowfishDB ensures same levels of accuracy and privacy as one would get working on the static privacy policy. In this demonstration of BlowfishDB, we show how a data curator can fine-tune privacy policies for a sensitive dataset and how a data analyst can retrieve accuracy-bounded query answers efficiently without being a privacy expert.
APA, Harvard, Vancouver, ISO, and other styles
2

Chicha, Elie, Bechara Al Bouna, Mohamed Nassar, Richard Chbeir, Ramzi A. Haraty, Mourad Oussalah, Djamal Benslimane, and Mansour Naser Alraja. "A User-Centric Mechanism for Sequentially Releasing Graph Datasets under Blowfish Privacy." ACM Transactions on Internet Technology 21, no. 1 (February 2021): 1–25. http://dx.doi.org/10.1145/3431501.

Full text
Abstract:
In this article, we present a privacy-preserving technique for user-centric multi-release graphs. Our technique consists of sequentially releasing anonymized versions of these graphs under Blowfish Privacy. To do so, we introduce a graph model that is augmented with a time dimension and sampled at discrete time steps. We show that the direct application of state-of-the-art privacy-preserving Differential Private techniques is weak against background knowledge attacker models. We present different scenarios where randomizing separate releases independently is vulnerable to correlation attacks. Our method is inspired by Differential Privacy (DP) and its extension Blowfish Privacy (BP). To validate it, we show its effectiveness as well as its utility by experimental simulations.
APA, Harvard, Vancouver, ISO, and other styles
3

Et. al., Pravin Soni,. "Performance Analysis of Cascaded Hybrid Symmetric Encryption Models." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (April 10, 2021): 1699–708. http://dx.doi.org/10.17762/turcomat.v12i2.1506.

Full text
Abstract:
Over a few years, there is rapid increase of exchange of data over the net has brought data confidentiality and its privacy to the fore front. Data confidentiality can be achieved by implementing cryptography algorithms during transmission of data which confirms that data remains secure and protected over an insecure network channel. In order to ensure data confidentiality and privacy, cryptography service encryption is used which makes data in unreadable form while the reverse process rearranges data in readable form and known as decryption. All encryption algorithms are intended to provide confidentiality to data, but their performance varies depending on many variables such as key size, type, number of rounds, complexity and data size used. In addition, although some encryption algorithms outperform others, they have been found to be prone to particular attacks. This paper reviews and summarizes the various common hybrid cascaded n-tier encryption models. Additionally, this paper compares and analyzes the performance of common hybrid cascaded 2-tier and 3-tier encryption models obtained during simulation based on encryption/decryption time, avalanche effect and throughput. The models compared with AES are 2-tier models (AES-TWOFISH, AES-BLOWFISH, TWOFISH-AES, BLOWFISH-AES, AES-SERPENT and SERPENT-TWOFISH) and 3-tier models (DES-BLOWFISH-AES, AES-TWOFISH-SERPENT and SERPENT-TWOFISH-AES). The hybrid cascaded model like AES-TWOFISH, AES-BLOWFISH and SERPENT-TWOFISH-AES are better hybrid models with respect to throughput and avalanche effect.
APA, Harvard, Vancouver, ISO, and other styles
4

Ezadeen, Shamil, and Auday H. Alwattar. "Survey of Blowfish Algorithm for Cloud." Technium: Romanian Journal of Applied Sciences and Technology 4, no. 6 (June 28, 2022): 18–28. http://dx.doi.org/10.47577/technium.v4i6.6791.

Full text
Abstract:
Abstract. Security is the study of encryption and decryption, data hiding, potential attacks, and performance evaluation. Many algorithms perform this purpose. Blowfish is a symmetric block cipher that uses the Feistel network. Although several works employed the Blowfish algorithm for the security of the cloud, there is still no article that lists previous studies. Cloud computing is the transmission of computer services such as servers, storage, databases, networking, software, analytics, and intelligence through the Internet ("the cloud") in order to provide faster innovation, more flexible resources, and cost savings. The most common issue with cloud computing is information security, privacy, confidentiality, and how the cloud provider ensures these services. This paper includes a survey of most previous works that were concerned with using the Blowfish algorithm in achieving cloud security
APA, Harvard, Vancouver, ISO, and other styles
5

Edwards, Tobias, Benjamin I. P. Rubinstein, Zuhe Zhang, and Sanming Zhou. "A Graph Symmetrization Bound on Channel Information Leakage Under Blowfish Privacy." IEEE Transactions on Information Theory 68, no. 1 (January 2022): 538–48. http://dx.doi.org/10.1109/tit.2021.3120371.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Dalave, Chetan Vijaykumar, Anushka Alok Lodh, and Tushar Vijaykumar Dalave. "Secure the File Storage on Cloud Computing Using Hybrid Cryptography Algorithm." International Journal for Research in Applied Science and Engineering Technology 10, no. 4 (April 30, 2022): 672–76. http://dx.doi.org/10.22214/ijraset.2022.41332.

Full text
Abstract:
Abstract: The proposed of this paper is for the security needs of the cloud data center. Blowfish is used to convert encrypt file cuts, takes the minimum amount of time, and has the extreme throughput for encryption and decryption from other compatible algorithms. The idea of spreading and mixing meets the principle of information security. The hybrid approach makes the remote servers more secure when deployed in a cloud environment and, thus helps cloud providers gain more trust from their users. Used for data safety and privacy issues, the basic challenge of separating sensitive data and access control has been met. Cryptography techniques translate original data into an unreadable format. The encryption technique is divided into private key encryption and public-key encryption. Here we will use AES 128-algorithm, DES, RC, and LSB encryption techniques. This technique uses keys to translate data into an unreadable format. Therefore only authorized persons can access data from the cloud server. Ciphertext data is visible to all. Keywords: Cloud, AES, RSA, Blowfish algorithms, Encryption/Decryption Techniques.
APA, Harvard, Vancouver, ISO, and other styles
7

Kumari, Nidhi, and Prof Vimmi Malhotra. "Secure Cloud Data Storage Using Hybrid Cryptography." International Journal for Research in Applied Science and Engineering Technology 10, no. 4 (April 30, 2022): 60–63. http://dx.doi.org/10.22214/ijraset.2022.41081.

Full text
Abstract:
Abstract: Nowadays a huge number of organizations use the cloud for storing Big data. And some of the sectors have sensitive data, for example, Military, Agencies, Colleges, Industries, etc. The data can be retrieved when the user requests it. And others can also access the data. Cloud computing provides a lot of features with affordable prices and knowledge accessibility by using the Internet. Security is the main concern in the cloud computing environment as clients store secret information with cloud providers, but sometimes these providers may not be trustful. Splitting data in a safe approach while protecting data from an untrusted cloud is still a demanding topic. In this paper we ensure the right approach for data security and privacy, using Blowfish, and RSA/SRNN algorithms. Keywords: Cloud Computing, Data storage, RSA/SRNN algorithm, Blowfish algorithm, Data storage.
APA, Harvard, Vancouver, ISO, and other styles
8

Liu, Changchang, Xi He, Thee Chanyaswad, Shiqiang Wang, and Prateek Mittal. "Investigating Statistical Privacy Frameworks from the Perspective of Hypothesis Testing." Proceedings on Privacy Enhancing Technologies 2019, no. 3 (July 1, 2019): 233–54. http://dx.doi.org/10.2478/popets-2019-0045.

Full text
Abstract:
Abstract Over the last decade, differential privacy (DP) has emerged as the gold standard of a rigorous and provable privacy framework. However, there are very few practical guidelines on how to apply differential privacy in practice, and a key challenge is how to set an appropriate value for the privacy parameter ɛ. In this work, we employ a statistical tool called hypothesis testing for discovering useful and interpretable guidelines for the state-of-the-art privacy-preserving frameworks. We formalize and implement hypothesis testing in terms of an adversary’s capability to infer mutually exclusive sensitive information about the input data (such as whether an individual has participated or not) from the output of the privacy-preserving mechanism. We quantify the success of the hypothesis testing using the precision- recall-relation, which provides an interpretable and natural guideline for practitioners and researchers on selecting ɛ. Our key results include a quantitative analysis of how hypothesis testing can guide the choice of the privacy parameter ɛ in an interpretable manner for a differentially private mechanism and its variants. Importantly, our findings show that an adversary’s auxiliary information - in the form of prior distribution of the database and correlation across records and time - indeed influences the proper choice of ɛ. Finally, we also show how the perspective of hypothesis testing can provide useful insights on the relationships among a broad range of privacy frameworks including differential privacy, Pufferfish privacy, Blowfish privacy, dependent differential privacy, inferential privacy, membership privacy and mutual-information based differential privacy.
APA, Harvard, Vancouver, ISO, and other styles
9

Ambika, M., Mangayarkarasi N., Raghuraman Gopalsamy, L. Sai Ramesh, and Kamalanathan Selvakumar. "Secure and Dynamic Multi-Keyword Ranked Search." International Journal of Operations Research and Information Systems 12, no. 3 (July 2021): 1–10. http://dx.doi.org/10.4018/ijoris.20210701.oa3.

Full text
Abstract:
Nowadays, information storing in third party storage is increased. Outsourcing the data to other storage device or servers which may questioned to the secure environment. However, sensitive data like medical information should need an privacy when it is stored in cloud storage. In this paper, a secure keyword search which provide the resultant data in a encrypted form where the end user can decrypt using the key given to them. It uses the Blowfish to encrypt the data and it also supports the data owner to delete or modify the content of their document. It also ensure accurate relevance score calculation between encrypted index and query vectors.
APA, Harvard, Vancouver, ISO, and other styles
10

Iftikhar, U., K. Asrar, M. Waqas, and S. A. Ali. "Evaluating the Performance Parameters of Cryptographic Algorithms for IOT-based Devices." Engineering, Technology & Applied Science Research 11, no. 6 (December 11, 2021): 7867–74. http://dx.doi.org/10.48084/etasr.4263.

Full text
Abstract:
Nowadays, terabytes of digital data are generated and sent online every second. However, securing this extent of information has always been a challenging task. Cryptography is a fundamental method for securing data, as it makes data unintelligible for attackers, offering privacy to authorized clients. Different cryptographic algorithms have different speeds and costs that make them suitable for different applications. For instance, banking applications need outrageous security amenities, as they utilize superior algorithms having greater requirements, while gaming applications focus more on speed and cost reduction. Consequently, cryptographic algorithms are chosen based on a client's prerequisites. This study compared DES, AES, Blowfish, and RSA, examining their speed, cost, and performance, and discussed their adequacy for use in wireless sensor networks and peer-to-peer communication.
APA, Harvard, Vancouver, ISO, and other styles
11

Et. al., Ch Chakradhara Rao,. "Enhanced Effective and Privacy Preserving Multi Keyword Search over Encrypted Data in Cloud Storage Using Blowfish Algorithm." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (April 11, 2021): 2845–53. http://dx.doi.org/10.17762/turcomat.v12i2.2316.

Full text
Abstract:
The data owner administers their data to the public cloud due to regulatory. Even this data encoded once it easily transmitted to the cloud. In order to ensure the privacy and security, cloud subscribers need a very different type of online data. This specific information must be germane to the recipient's query. The user to inspect the query too in the cloud with umpteen keywords can accomplish this. With the intention to defend the privacy of data, confidential data encoded before subcontracting by the metadata owner, attempting to make the traditional and efficient plaintext keyword search tactic pointless. Therefore, it is crucial to explore a secure data search service for encrypted user data. Due to the growing of massive number of digital users and legal documents in the cloud, umpteen keywords forced in the search request and documents returned in the order of their relevance to these keywords.Cloud assistance end-user demands cloud information by various paternoster inquiry, whichlabelled as umpteenkeywordstratified exploration over scrambled information. In the cloud server, all the client inquiries exchanged. Server looks through the significant matter by utilizing the harmonic equivalency and sends the applicable outcomes to the client. Information got from cloud server is in the scrambled configuration. To get to control to the client,Information proprietor furnishes with key for unscrambling of information. Message Authentication Code(MAC) calculation is utilized to check and confirm trustworthiness of information. Thusly this paper depicts the method of giving security to redistribute information on cloud and checking the trustworthiness of information using blowfish algorithm. Comparison results shows the improvement in efficiency of Data Retrieval and Time efficiency.
APA, Harvard, Vancouver, ISO, and other styles
12

Selvi, M., and B. Ramakrishnan. "Secured Message Broadcasting in VANET using Blowfish Algorithm with Oppositional Deer Hunting Optimization." International Journal of Computer Network and Information Security 13, no. 2 (April 8, 2021): 39–52. http://dx.doi.org/10.5815/ijcnis.2021.02.04.

Full text
Abstract:
Emergency Message broadcasting is an important process in VANET. Security and reliable transmission are the two major concerns in message broadcasting. VANET is open to unauthorized nodes, hackers, misbehaving vehicles, malicious attackers etc without security. Without valid confirmation of authorized vehicles, these types of attacks may occur. To enhance the reliability in message broadcasting, some existing techniques are used. They transmit the data without much delay but they didn’t provide any trusted authentication. So hackers, malicious nodes, unauthorized vehicles may easily interrupt the emergency messages. Also Brute force attack, Man in Middle attack are not identified and eliminated. In this research, a trust based secured broadcasting mechanism is developed which ensures the metrics such as security, privacy, integrity, trust etc. The major intension of this research is to reduce latency and provide high reliable, secure and efficient communication over the vehicles. The data such as vehicle position, location, speed, and other traffic information’s are generated and stored in a separate table. A network is created with varying densities. A path is generated for message broadcasting between source and destination based on the specific gateway estimated. Here, Optimal Wireless Access in Vanet (OWAV) Protocol is employed to gather vehicle related information to reduce the delay. Blowfish encryption algorithm along with Oppositional Deer Hunting Optimization (ODHO) is used to store the trusted vehicles location to avoid unauthorized tracking. The performance of the proposed research is analyzed with various metrics such as Packet delivery ratio (PDR), transmission delay, encryption time, throughput, computational overhead etc. The efficiency of the research is compared with other existing methods.
APA, Harvard, Vancouver, ISO, and other styles
13

Raut, Kinjal. "A Comprehensive Review of Cryptographic Algorithms." International Journal for Research in Applied Science and Engineering Technology 9, no. 12 (December 31, 2021): 1750–56. http://dx.doi.org/10.22214/ijraset.2021.39581.

Full text
Abstract:
Abstract: The internet has revolutionized advancements, it’s conveniences and uses come at the price of new perils. To be safe from being the victim of fraud, theft and other damage security and vigilance is critical. Cryptography plays an important role in securing information and communications using a set of rules, it ensures the integrity of our data. It maintains confidentiality by protecting the privacy of personal information stored in enterprise systems. Hence Encryption is the only way to ensure that your information remains secure while it is stored and being transmitted. Cryptographic Algorithms mathematically maintain the integrity, confidentiality and authenticity of sensitive information by preventing data disclosure, data tampering and repudiation. The three main types of cryptography are Symmetric Key Cryptography, Asymmetric Key Cryptography and Hash Functions. In this Paper, several important algorithms used for encryption and decryption are defined and analysed, the algorithms are DES, AES, ECC, RSA, MD5 Keywords: Cryptography, Encryption, Decryption, AES, DES, ECC, RSA, Blowfish, MD5
APA, Harvard, Vancouver, ISO, and other styles
14

S, Nithyadevi, and Dr Sasirekha V. "An Efficient Vehicle Privacy Preservation Scheme with Enhanced Blowfish Encryption Algorithm for Ensuring Security in Vehicular Ad-Hoc Network (VANET)." Journal of Advanced Research in Dynamical and Control Systems 12, no. 05-SPECIAL ISSUE (May 30, 2020): 406–13. http://dx.doi.org/10.5373/jardcs/v12sp5/20201774.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Rifa’i, Annas, and Lilis Cucu Sumartini. "IMPLEMENTASI KRIPTOGRAFI MENGGUNAKAN METODE BLOWFISH DAN BASE64 UNTUK MENGAMANKAN DATABASE INFORMASI AKADEMIK PADA KAMPUS AKADEMI TELEKOMUNIKASI BOGOR BERBASIS WEB-BASED." Jurnal E-Komtek (Elektro-Komputer-Teknik) 3, no. 2 (November 12, 2019): 87–96. http://dx.doi.org/10.37339/e-komtek.v3i2.133.

Full text
Abstract:
Data is a very authentic evidence that need to be saved because the data are at risk of data changes by the party who wanted to misuse the data or no effect on the data. Therefore, so that no unauthorized person to change the existing data, stored or can take the data that is very important, we need a method to be able to secure and keep data. The database is used to keep data and information. The whole system stores the data in the database, so that the contents of stored data security and confidentiality must be maintained. To maintain the security of a security that is required cryptography. With the use of databases that are in can be connected to each other, Database is not just a place to store data,Computer security system is needed at this time in line with the increase use of computers in the world. So existing data security has become seriously threatened to be accessed by people who are not responsible. Computer security becomes very important at this time because it is related to the privacy, integrity, authentication and confidentiality. Thus data need to be stored by using the correct storage techniques, so that the confidentiality and security of data is maintained. Cryptographic techniques with engineering data encryption on the database is one solution that can be used to meet the confidentiality and Data Security settings. With the existence of a cryptography that includes the encryption process, the data in the database can be encoded so that unauthorized persons can not read the information, in addition to those who know the key to describing it. Security of data / information document with a cryptographic technique that uses the Blowfish algorithm chosen method for cryptographic key modernmerupakan shaped symmetric block cipher. Blowfish algorithm which can encrypt text built in text form. Encryption is done using a specific key, resulting ciphertext that can not be understood. The ciphertext can be changed back as the beginning if the decryption using the same key in the beginning when the database mengekripsi.
APA, Harvard, Vancouver, ISO, and other styles
16

Goyal, Mani, and Avinash Sharma. "A Framework for Assessing Security Strength of Cloud Computing Service." Journal of Computational and Theoretical Nanoscience 16, no. 10 (October 1, 2019): 4389–93. http://dx.doi.org/10.1166/jctn.2019.8530.

Full text
Abstract:
Cloud computing is mentioned to evolve dynamically and cloud transformation is getting easier all the time. Different cloud aspects are emerging in an efficient manner and have the potential to transform the traditional way of computing. With the advent of data sharing in cloud computing, the demand for outsourcing data has rapidly increased in the last decade. However, several security and privacy challenges exist impeding the acceptance of cloud computing. A highly secure system is required to guard an organizational entity, its resources, and assets. In this article, we propose and implement a novel architecture, the first of its kind, providing an enhanced level of security for outsourcing data in a cloud computing environment consisting of multiple independent cloud providers. The framework consists of dual encryption combining Homomorphic encryption at the client end and Blowfish cryptographic technique at the server side for authorization. The diverse security issues associated with information integrity, security, confidentiality, and authenticationmust be addressed. Simulations and analysis were performed on an Oracle virtual machine Virtual-Box and a Fog environment on Ubuntu 12.04 platform. Extensive safety measures and performance analysis considering the Encrypted file size and Encryption time demonstrate that our projected proposal is vastly proficient and satisfies the requirements for secure data sharing.
APA, Harvard, Vancouver, ISO, and other styles
17

Raja, S. P. "Multiscale transform-based secured joint efficient medical image compression-encryption using symmetric key cryptography and ebcot encoding technique." International Journal of Wavelets, Multiresolution and Information Processing 17, no. 05 (September 2019): 1950034. http://dx.doi.org/10.1142/s0219691319500346.

Full text
Abstract:
Due to the huge advancement in technology, digitizing the multimedia content like text, images and videos has become easier. Everyday huge amounts of multimedia content are shared through the social networks using internet. Sometimes this multimedia content can be hacked by the hackers. This will lead to the misuse of the data. On the other hand, the medical content needs high security and privacy. Motivated by this, joint secured medical image compression–encryption mechanisms are proposed in this paper using multiscale transforms and symmetric key encryption techniques. The multiscale transforms involved in this paper are wavelet transform, bandelet transform and curvelet transform. The encryption techniques involved in this paper are international data encryption algorithm (IDEA), Rivest Cipher (RC5) and Blowfish. The encoding technique used in this paper is embedded block coding with truncation (EBCOT). Experimental results are done for the proposed works and evaluated by using various parameters like Peak Signal-to-Noise Ratio (PSNR), Mean Square Error (MSE), Image Quality Index (IQI) and Structural Similarity Index (SSIM), Average Difference (AD), Normalized Cross-correlation (NK), Structural Content (SC), Maximum difference (MD), Laplacian Mean Squared Error (LMSE) and Normalized Absolute Error (NAE). It is justified that the proposed approaches in this paper yield good results.
APA, Harvard, Vancouver, ISO, and other styles
18

Solanki, Madan, and Prof (Dr ). Vrinda Tokekar. "Design and Implementation of Strong Security Architecture for Amazon Web Service based on Cloud Applications." International Journal of Innovative Technology and Exploring Engineering 11, no. 12 (November 30, 2022): 17–22. http://dx.doi.org/10.35940/ijitee.l9324.11111222.

Full text
Abstract:
Cloud applications are becoming a necessary part of modern life. Security is one of the most important non-functional requirements of every solution. Early days, security and data privacy was just luxury part of software development and it was an optional requirement but nowadays it plays a critical role in daily life. The presented work will be made to observe the need for symmetric security algorithms in Cloud application with Amazon web service. This work observes that the current security level of existing applications recommend improved security solutions to enhance the security level as well performance of proposed architecture. This work recommends Blowfish, RC6 algorithm (symmetric key cryptography) can be used to achieve confidentiality during communication Amazon web service Platform. It also considers the MD5 algorithm to maintain the integrity and modified Kerberos algorithm to achieve authentication. The complete work will propose a security architecture having solution to achieve confidentiality, integrity with strong authentication policy for Cloud application development in Amazon web service. The strong security architecture provide for data and minimum executive time in upload and download file, different key size, file size and chunking size in file. File size divided into chunk 512 bit, 1024 bit, 2048 bit after process in Amazon web service, we are found the optimum time are chunking file size 2048 bits reduce time in encryption and decryption data process and maintain strong security data file in communication including file size 5, 10, 15 and 20 Megabyte.
APA, Harvard, Vancouver, ISO, and other styles
19

Lalita Kumar Parvataneni, Mohith, Eswara Sai Nath Adusumalli, and Rajeshbabu C. "Secure and Efficient Query Processing Using Randomized Encryption and De-duplication on the Cloud." International Journal of Engineering & Technology 7, no. 2.24 (April 25, 2018): 311. http://dx.doi.org/10.14419/ijet.v7i2.24.12071.

Full text
Abstract:
Cloud computing [1] is the most upcoming area of the IT industry that helps the users to get rid of the hardware resources and complexity in storage and computational power. All the people started using cloud which led to many security concerns relating to the data confidentiality and integrity. This became a challenge to the widespread of the new cloud computing technology. Many measures are taken to improve the cloud security and then there came the concept of cryptography to upgrade the cloud security. Today, the main problem is to sustain data privacy [2] against unreliable cloud service providers and to provide correct query results to the authenticated users. Existing approach provide confidentiality using only one symmetric encryption algorithm which generates only one secret key to both encrypt and decrypt. But this is not so secured as the attacker can easily guess the algorithm and thereby find the key. In this journal, we proposed a randomized encryption technique in which the files are randomly encrypted by three strong algorithms AES, Triple DES and Blowfish [3] which improves the security and we are also implementing new techniques to improve security like key generation via OTP method, etc. In addition to this, we are also going to solve the storage issue of redundant or duplicate files consuming the cloud storage by using a file-level de-duplication technique which can eliminate the duplication of files uploaded into the cloud, thereby saving storage and reduce the need to buy extra storage.
APA, Harvard, Vancouver, ISO, and other styles
20

Nita, Stefania, Marius Mihailescu, and Valentin Pau. "Security and Cryptographic Challenges for Authentication Based on Biometrics Data." Cryptography 2, no. 4 (December 6, 2018): 39. http://dx.doi.org/10.3390/cryptography2040039.

Full text
Abstract:
Authentication systems based on biometrics characteristics and data represents one of the most important trend in the evolution of the society, e.g., Smart City, Internet-of-Things (IoT), Cloud Computing, Big Data. In the near future, biometrics systems will be everywhere in the society, such as government, education, smart cities, banks etc. Due to its uniqueness, characteristic, biometrics systems will become more and more vulnerable, privacy being one of the most important challenges. The classic cryptographic primitives are not sufficient to assure a strong level of secureness for privacy. The current paper has several objectives. The main objective consists in creating a framework based on cryptographic modules which can be applied in systems with biometric authentication methods. The technologies used in creating the framework are: C#, Java, C++, Python, and Haskell. The wide range of technologies for developing the algorithms give the readers the possibility and not only, to choose the proper modules for their own research or business direction. The cryptographic modules contain algorithms based on machine learning and modern cryptographic algorithms: AES (Advanced Encryption System), SHA-256, RC4, RC5, RC6, MARS, BLOWFISH, TWOFISH, THREEFISH, RSA (Rivest-Shamir-Adleman), Elliptic Curve, and Diffie Hellman. As methods for implementing with success the cryptographic modules, we will propose a methodology which can be used as a how-to guide. The article will focus only on the first category, machine learning, and data clustering, algorithms with applicability in the cloud computing environment. For tests we have used a virtual machine (Virtual Box) with Apache Hadoop and a Biometric Analysis Tool. The weakness of the algorithms and methods implemented within the framework will be evaluated and presented in order for the reader to acknowledge the latest status of the security analysis and the vulnerabilities founded in the mentioned algorithms. Another important result of the authors consists in creating a scheme for biometric enrollment (in Results). The purpose of the scheme is to give a big overview on how to use it, step by step, in real life, and how to use the algorithms. In the end, as a conclusion, the current work paper gives a comprehensive background on the most important and challenging aspects on how to design and implement an authentication system based on biometrics characteristics.
APA, Harvard, Vancouver, ISO, and other styles
21

Jabbar, Arshi, and Prof Umesh Lilhore. "Design and Implementation of Hybrid EC-RSA Security Algorithm Based on TPA for Cloud Storage." SMART MOVES JOURNAL IJOSCIENCE 3, no. 11 (November 30, 2017): 6. http://dx.doi.org/10.24113/ojsscience.v3i10.148.

Full text
Abstract:
Cloud storage is one among the service provided by Cloud computing within which information is maintained, managed, secured remotely and created available to users over a network. The user concerning about the integrity of data hold on within the cloud because the user’s data will be attacked or changed by outside attacker. Therefore, a new thought referred to as information auditing is introduced that check the integrity of knowledge with the assistance of an entity referred to as Third Party Auditor (TPA). The aim of this work is to develop an auditing scheme that is secure, economical to use and possess the capabilities like privacy conserving, public auditing, maintaining the information integrity together with confidentiality. It comprises 3 entities: data owner, TPA and cloud server. The data owner performs numerous operations like splitting the file to blocks, encrypting them, generating a hash value for every, concatenating it and generating a signature on that. The TPA performs the main role of knowledge integrity check. It performs activities like generating hash value for encrypted blocks received from cloud server, concatenating them and generates signature on that. It later compares each the signatures to verify whether or not the information stored on cloud is tampered or not. It verifies the integrity of data on demand of the users. To make sure data protection or security of cloud data storage at cloud end, security architecture is designed that secures the data using encryption/decryption algorithm where the proposed algorithm is a hybrid encryption algorithm that uses the concept of EC-RSA, AES algorithm and Blowfish algorithm along with SHA-256 for auditing purpose. Presented experiment results show that the proposed concept is reasonable, it enhancing efficiency about 40% in terms of execution time i.e. encryption as well as decryption time and security and providing confidentiality of cloud data at could end.
APA, Harvard, Vancouver, ISO, and other styles
22

Hema S and Dr.Kangaiammal A. "A Secure Method for Managing Data in Cloud Storage using Deduplication and Enhanced Fuzzy Based Intrusion Detection Framework." November 2020 6, no. 11 (November 30, 2020): 165–73. http://dx.doi.org/10.46501/ijmtst061131.

Full text
Abstract:
Cloud services increase data availability so as to offer flawless service to the client. Because of increasing data availability, more redundancies and more memory space are required to store such data. Cloud computing requires essential storage and efficient protection for all types of data. With the amount of data produced seeing an exponential increase with time, storing the replicated data contents is inevitable. Hence, using storage optimization approaches becomes an important pre-requisite for enormous storage domains like cloud storage. Data deduplication is the technique which compresses the data by eliminating the replicated copies of similar data and it is widely utilized in cloud storage to conserve bandwidth and minimize the storage space. Despite the data deduplication eliminates data redundancy and data replication; it likewise presents significant data privacy and security problems for the end-user. Considering this, in this work, a novel security-based deduplication model is proposed to reduce a hash value of a given file size and provide additional security for cloud storage. In proposed method the hash value of a given file is reduced employing Distributed Storage Hash Algorithm (DSHA) and to provide security the file is encrypted by using an Improved Blowfish Encryption Algorithm (IBEA). This framework also proposes the enhanced fuzzy based intrusion detection system (EFIDS) by defining rules for the major attacks, thereby alert the system automatically. Finally the combination of data exclusion and security encryption technique allows cloud users to effectively manage their cloud storage by avoiding repeated data encroachment. It also saves bandwidth and alerts the system from attackers. The results of experiments reveal that the discussed algorithm yields improved throughput and bytes saved per second in comparison with other chunking algorithms.
APA, Harvard, Vancouver, ISO, and other styles
23

Irfan, Pahrul, Rifqi Hammad, Andi Sofyan Anas, Fatimatuzzahra Fatimatuzzahra, and Nanang Samudra. "Application of the Blowfish Algorithm in securing patient data in the database." MATRIX : Jurnal Manajemen Teknologi dan Informatika 12, no. 2 (July 31, 2022): 102–8. http://dx.doi.org/10.31940/matrix.v12i2.102-108.

Full text
Abstract:
Patient data is one of the datasets managed by the hospital. Patient data in the form of examination results and other data is important data that is private and confidential. Therefore, patient data needs to be secured so that there is no misuse of data by parties who are not responsible for things that can harm the data owner. One of the several methods that can be used to secure data is cryptography. Cryptography itself has several algorithms, one of which is blowfish. This study applies the blowfish algorithm to secure patient data in the database to reduce the possibility of data misuse by irresponsible parties. This study succeeded in implementing the blowfish algorithm for securing patient data. The data stored in the database is the result of encryption using the blowfish algorithm, the results of which are difficult to understand because there is a combination of symbols and text. The application of the algorithm affects the data storage time in the database, which originally took 0.12 seconds to save data and now takes 0.28 seconds to store data.
APA, Harvard, Vancouver, ISO, and other styles
24

HS, Christnatalis, and Amir Mahmud Husein. "Digital Signs Security System using AES-Blowfish-RSA Hybrid Cryptography Approach." SinkrOn 4, no. 1 (October 11, 2019): 185. http://dx.doi.org/10.33395/sinkron.v4i1.10244.

Full text
Abstract:
Increasing application of digital signatures in legitimate authentication of administrative documents in both public and private environments is one of the points of concern, especially the issue of security and integrity of ownership of signatures. Digital signature is a mathematical scheme, which a unit to identify and prove the authenticity of the owner of the message or document. The study aims to analyze security patterns and identification of digital signatures on documents using the RSA-AES-Blowfish hybrid cryptographic method approach for securing digital signatures, while the Kohonen SOM method is applied to identify ownership recognition of signature images. The analysis framework used in this study is each signature will be stored in the form of a digital image file that has been encrypted using hybrid method of AES-Blowfish with the SHA 256 hash function. Process of forming private keys and public keys in the signature image using the RSA algorithm. Authentic verification of the use of digital signatures on the document has 2 (two) stages, the first stage is signature will be valid used on the document if the result of hashing the selected signature image is the same based on the private key and public key entered by the user, while the second stage identification is done using the Kohonen SOM method to validate the similarity of the chosen signature with the ownership of the signature.
APA, Harvard, Vancouver, ISO, and other styles
25

Abu-Faraj, Mua’ad, Abeer Al-Hyari, and Ziad Alqadi. "A Complex Matrix Private Key to Enhance the Security Level of Image Cryptography." Symmetry 14, no. 4 (March 24, 2022): 664. http://dx.doi.org/10.3390/sym14040664.

Full text
Abstract:
Standard methods used in the encryption and decryption process are implemented to protect confidential data. These methods require many arithmetic and logical operations that negatively affect the performance of the encryption process. In addition, they use private keys of a specific length, in addition to the fixed length of the data block used in encryption, which may provide the possibility of penetration of these methods, thus decreasing the level of security. In this research paper, a new method of digital image cryptography is introduced. This method is based on using a color image as an image_key to generate a sophisticated matrix private key (MPK) that cannot be hacked. The proposed method uses an initial state to set the required parameters, with secret information needed to generate the private key. The data-block size is variable, and the complicity of the MPK depends on the number of selected rounds and the data-block size. The proposed method is appropriate for publication in Symmetry because it employs a symmetrical complex matrix key to encrypt and decrypt digital images. The proposed method is simple yet very efficient in terms of throughput and scalability. The experiments show that the proposed method meets the quality requirements and can speed up the encryption–decryption process compared with standard methods, including DES, 3DES, AES, and Blowfish.
APA, Harvard, Vancouver, ISO, and other styles
26

Elangovan, Dinesh, and Ramesh Muthiya. "Design and Implementation of Crypt Analysis of Cloud Data Intrusion Management System." International Arab Journal of Information Technology 17, no. 6 (November 1, 2020): 895–905. http://dx.doi.org/10.34028/iajit/17/6/8.

Full text
Abstract:
Cloud computing is the method of employing a set-up of isolated servers to be hosted on the web to accumulate and supervise information instead of an area server or a private laptop. Storage of data in cloud sometimes creates security issues in the data stored so, security in provided for the stored cloud data. In order to provide secured cloud data transaction, our proposed method initially verifies the authentication of the user followed by splitting the information of the user using pattern-matching technique. The blowfish computation is used to encrypt the alienated data. After encryption, resorting to the selection of the optimal position of a data center by means of the cross grey wolf optimization and firefly technique is done. Finally, the encrypted data are stored at an optimal location in the cloud. Then the data split column wise and separated at an optimal location in the cloud, this method is highly secured since the user cannot retrieve the file without authentication verification
APA, Harvard, Vancouver, ISO, and other styles
27

Htet, May, and Su Wai Phyo. "A Novel Text Steganographic Technique Using Specific Alphabets." Journal of Computer Science 2, no. 1 (July 16, 2016): 1–11. http://dx.doi.org/10.31357/jcs.v2i1.2721.

Full text
Abstract:
In today’s electronic era, wealth of electronic information are accessing over the Internet. Several important information and private data transferring over the Internet are being hacked by attackers via latest communication technology. So, maintaining the security of secret data has been a great challenge. To tackle the security problem, cryptographic methods as well as steganographic techniques are essential. This paper focuses on hybrid security system using cryptographic algorithm and text steganographic technique to achieve a more robust security system. In this work, to overcome the limited data hiding capacity, suspiciousness, and data damaging effect due to modification, of traditional steganographic techniques, a new technique for information hiding in text file is proposed. The proposed approach conceals a message, without degrading cover, by using first, second, second last, and last letter of words of the cover text. Hence, from the embedding capacity point of view, its capacity depends on the similarity of characters of the words in cover text. In addition, as further improvement for security, secret message encryption is performed using Blowfish algorithm before hiding into the innocuous cover text.
APA, Harvard, Vancouver, ISO, and other styles
28

Chatterjee, Ayan, and Andreas Prinz. "Applying Spring Security Framework with KeyCloak-Based OAuth2 to Protect Microservice Architecture APIs: A Case Study." Sensors 22, no. 5 (February 22, 2022): 1703. http://dx.doi.org/10.3390/s22051703.

Full text
Abstract:
In this study, we implemented an integrated security solution with Spring Security and Keycloak open-access platform (SSK) to secure data collection and exchange over microservice architecture application programming interfaces (APIs). The adopted solution implemented the following security features: open authorization, multi-factor authentication, identity brokering, and user management to safeguard microservice APIs. Then, we extended the security solution with a virtual private network (VPN), Blowfish and crypt (Bcrypt) hash, encryption method, API key, network firewall, and secure socket layer (SSL) to build up a digital infrastructure. To accomplish and describe the adopted SSK solution, we utilized a web engineering security method. As a case study, we designed and developed an electronic health coaching (eCoach) prototype system and hosted the system in the expanded digital secure infrastructure to collect and exchange personal health data over microservice APIs. We further described our adopted security solution’s procedural, technical, and practical considerations. We validated our SSK solution implementation by theoretical evaluation and experimental testing. We have compared the test outcomes with related studies qualitatively to determine the efficacy of the hybrid security solution in digital infrastructure. The SSK implementation and configuration in the eCoach prototype system has effectively secured its microservice APIs from an attack in all the considered scenarios with 100% accuracy. The developed digital infrastructure with SSK solution efficiently sustained a load of (≈)300 concurrent users. In addition, we have performed a qualitative comparison among the following security solutions: Spring-based security, Keycloak-based security, and their combination (our utilized hybrid security solution), where SSK showed a promising outcome.
APA, Harvard, Vancouver, ISO, and other styles
29

Seada Abdu Wakene, Sisay Muleta Hababa, Gutema Seboka Daba, and K S Ananda Kumar. "Data Storage Security in Mobile Cloud Computing (MCC) using Improved Blowfish Algorithm." International Journal of Scientific Research in Computer Science, Engineering and Information Technology, November 15, 2021, 100–111. http://dx.doi.org/10.32628/cseit217620.

Full text
Abstract:
Mobile cloud computing (MCC) combines cloud computing and mobile computing to deliver vast computational resources to mobile consumers, network operators, and cloud computing providers. You may access your data from anywhere in the globe using any mobile device that is linked to the Internet. Cloud computing provides access to data in real-time whenever and wherever want. Any conventional mobile device can benefit from MCC's infrastructure, computational capacity, software, and platform services. Network security, web application security, data access, authentication, authorization, data confidentiality, and data breach are all concerns of MCC's security. Because mobile devices lack sufficient storage and processing power, their data storage capacity is limited. Users of mobile devices may inadvertently provide sensitive information over the network or through the application. Therefore, data security is the main concern for mobile device users. The objective of this paper is to find a solution that can enhance technical requirements with relation to user’s data security and privacy in mobile cloud computing. To achieve this improved blowfish encryption algorithm is used to encrypt each user’s data security and where the shared secret key is hash down using message digest called secured hash function. Hashing can increase the integrity and privacy of user data. The proposed algorithm is evaluated with a normal blowfish algorithm and 3DES with different parameters. Improved blowfish algorithm shows better performance than normal blowfish algorithm and 3DES. In this work, we have developed web-based application where the Amazon MySQL RDS database is used for data storage.
APA, Harvard, Vancouver, ISO, and other styles
30

"Secure Ranked Multi-Keyword Search based on Modified Blowfish Algorithm and AVL Tree in Untrusted Cloud Environment." International Journal of Engineering and Advanced Technology 9, no. 1 (October 30, 2019): 6738–44. http://dx.doi.org/10.35940/ijeat.a2041.109119.

Full text
Abstract:
Advancement in cloud services growing day by day motivates a huge number of data proprietors to store their valuable data in cloud servers. For privacy issue, datasets that contain sensitive information are encrypted first and then outsourced into the cloud server. In this paper, ranked multi keyword search based on AVL tree, especially for several data owners, has been proposed. To avoid unauthorized access, the proposed work encrypts the data using a Modified Blowfish (MB) algorithm before outsourcing. MB algorithm introduces # operation instead of normal OR operation in conventional blowfish algorithm. This MB algorithm provides robustness against any intruding whereas the conventional blowfish algorithm insecure for many applications. To achieve a proficient search, every data owner’s index based on AVL tree is encrypted by way of additive order and the privacy-preserving family is formed. The cloud server is then permitted to combine these indexes effectually without knowing the index content. An Iterative Deepening Depth First Search (IDDFS) procedure is used to discover the matching file for the data user request. Finally, our proposed work provides secure data outsourcing to cloud server compared to the other existing methods. The proposed work considers three metrics for the performance evaluation process, viz. precision, index construction time and search time.
APA, Harvard, Vancouver, ISO, and other styles
31

Alabdulrazzaq, Haneen, and Mohammed N. Alenezi. "Performance Evaluation of Cryptographic Algorithms: DES, 3DES, Blowfish, Twofish, and Threefish." International Journal of Communication Networks and Information Security (IJCNIS) 14, no. 1 (April 15, 2022). http://dx.doi.org/10.17762/ijcnis.v14i1.5262.

Full text
Abstract:
With the advancement of the Internet, many individuals and organizations have started to use it to store and send personal or business information. Some of this information is highly confidential and that, in turn, raises an issue of data privacy and confidentiality. Major advances in the Internet have also aided intruders in getting unauthorized access to confidential information. Information Security is the art of securing data from illegitimate access while ensuring integrity, availability, and confidentiality of data. Information Security is achieved through cryptographic encryption and decryption algorithms. Encryption hides confidential information by converting it to an unreadable form while the reverse process of retrieving data from the unreadable or encrypted form is known as decryption. Many cryptographic algorithms exist today and selecting which one to use depends on several factors and measures. This paper conducts a comparison of the encryption speed for five different cryptographic symmetric block-cipher algorithms: DES, 3DES, Blowfish, Twofish, and Threefish. The simulation is done using Python with various text file sizes. The results show that Blowfish outperforms the rest of the algorithms that were tested.
APA, Harvard, Vancouver, ISO, and other styles
32

"Enhancing Image Security by employing Blowfish Algorithm further embedding text and Stitching the RGB components of a Host Image." International Journal of Recent Technology and Engineering 8, no. 2S11 (November 2, 2019): 3801–8. http://dx.doi.org/10.35940/ijrte.b1499.0982s1119.

Full text
Abstract:
‘Privacy, privacy everywhere but not a safety method to implement it’: a harsh reality of today’s world. With the precipitation of more data (2 x 1019 bits of data is created in every 86400 seconds) in computer networks, involvement of meta-data in the form of images is essential. To keep data safe and secure in order to inculcate privacy, to eradicate any kind of eavesdropping, and to maintain confidentiality, integrity and availability of it, certain security measures are needed to make in account for. So in order to make it available, we required a technique through which we can securely transfer any kind of data over a network. In practise the information security can be achieved either by using Cryptography or Steganography. The process described in this paper is not a mediocre it is more scrupulous towards the security because it involves image encryption, steganography and image stitching. Initially we are encrypting an image using Blowfish algorithm then we are embedding the secret text into this encrypted image by modifying the least significant bit (LSB) of the image by our data. Moreover, to enhance the privacy and security we are stitching the above resultant image with the red, green and blue (RGB) components of a host image and thereby producing an image more secure than the one which the existing systems can form for data transmission..
APA, Harvard, Vancouver, ISO, and other styles
33

"Secure And Dynamic Multi Keyword Ranked Search." International Journal of Operations Research and Information Systems 12, no. 3 (July 2021): 0. http://dx.doi.org/10.4018/ijoris.20210701oa03.

Full text
Abstract:
Nowadays, information storing in third party storage is increased. Outsourcing the data to other storage device or servers which may questioned to the secure environment. However, sensitive data like medical information should need an privacy when it is stored in cloud storage. In this paper, a secure keyword search which provide the resultant data in a encrypted form where the end user can decrypt using the key given to them. It uses the Blowfish to encrypt the data and it also supports the data owner to delete or modify the content of their document. It also ensure accurate relevance score calculation between encrypted index and query vectors.
APA, Harvard, Vancouver, ISO, and other styles
34

Fahriah, Wildatunnisa, and Tulus Febrianto. "Aplikasi Enkripsi dan Dekripsi Short Message Service di Android Menggunakan Metode Blowfish." JISA(Jurnal Informatika dan Sains) 2, no. 1 (June 27, 2019). http://dx.doi.org/10.31326/jisa.v2i1.512.

Full text
Abstract:
Short Message Service (SMS) is a communication technology that is very popular. By using SMS someone can exchange messages with others. However, with the wiretapping issue sms, a person no longer has the right to privacy. So the program was made on a mobile phone-based application that will change the android SMS messages into codes so that information from SMS in not known by others. When sending SMS, this application will encrypt the message into shape with a key codes entered by the sender. And when the acceptance of SMS, this application will describe the codes message into form of the original message using the same key with the sender. This application was made in the android based application to send an important message to others without fear of being noticed by others. The method used in the application to encrypt and decrypt the messages are methods Block Cipher Algorithm or also called blowfish method and its implementation using the java programming language with the android mobile platform.
APA, Harvard, Vancouver, ISO, and other styles
35

Permana, Angga Aditya. "APLIKASI PENYISIPAN TEKS PADA GAMBAR DENGAN ALGORITMA BLOWFISH DAN LEAST SIGNIFICANT BIT." JIKA (Jurnal Informatika) 1, no. 1 (June 17, 2017). http://dx.doi.org/10.31000/jika.v1i1.718.

Full text
Abstract:
Aplikasi komputer pada berbagai bidang kehidupan menimbulkan beberapa kekhawatiran, salah satunya berkaitan dengan keamanan bertransaksi melalui media ini. Belakangan ini, steganografi menjadi metode yang sangat menarik perhatian sebagai salah satu jalan keluar yang menjanjikan. Steganografi dilakukan dengan tujuan mencegah penyalahgunaan informasi (hacking), sehingga informasi tersebut terlindung dari hal-hal yang tidak diinginkan. Kriptografi dan steganografi saat ini telah menjadi kebutuhan bagi mereka yang membutuhkan privacy dan security dalam hal pengiriman data teks, suara, image, serta video. Untuk menghindari pesan informasi bisa dibaca oleh orang yang tidak berhak mendapatkan informasi tersebut, bahkan tidak diketahui atau disadari oleh pihak ketiga, bahwa data ataupun file image yang dilihat tersebut mengandung informasi rahasia, terkecuali bagi mereka yang mengerti kuncinya. Implementasi menggabungkan dua teknik kriptografi dan steganografi yang disisipkan pada sebuah file gambar untuk menjamin lebih kuat dan aman informasi yang ada didalam file gambar tersebut. Metode yang digunakan adalah melakukan teknik kriptografi terlebih dahulu menggunakan algoritma Blowfish “OpenPGP.Cipher.4”. Teks informasi yang telah terenkripsi tersebut kemudian dimasukkan pada pixel yang diambil dengan menggunakan metode Least Significant Bit Insertion (LSB).
APA, Harvard, Vancouver, ISO, and other styles
36

Permana, Angga Aditya. "APLIKASI PENYISIPAN TEKS PADA GAMBAR DENGAN ALGORITMA BLOWFISH DAN LEAST SIGNIFICANT BIT." JIKA (Jurnal Informatika) 1, no. 1 (May 8, 2018). http://dx.doi.org/10.31000/jika.v1i1.743.

Full text
Abstract:
Aplikasi komputer pada berbagai bidang kehidupan menimbulkan beberapa kekhawatiran, salah satunya berkaitan dengan keamanan bertransaksi melalui media ini. Belakangan ini, steganografi menjadi metode yang sangat menarik perhatian sebagai salah satu jalan keluar yang menjanjikan. Steganografi dilakukan dengan tujuan mencegah penyalahgunaan informasi (hacking), sehingga informasi tersebut terlindung dari hal-hal yang tidak diinginkan. Kriptografi dan steganografi saat ini telah menjadi kebutuhan bagi mereka yang membutuhkan privacy dan security dalam hal pengiriman data teks, suara, image, serta video. Untuk menghindari pesan informasi bisa dibaca oleh orang yang tidak berhak mendapatkan informasi tersebut, bahkan tidak diketahui atau disadari oleh pihak ketiga, bahwa data ataupun file image yang dilihat tersebut mengandung informasi rahasia, terkecuali bagi mereka yang mengerti kuncinya. Implementasi menggabungkan dua teknik kriptografi dan steganografi yang disisipkan pada sebuah file gambar untuk menjamin lebih kuat dan aman informasi yang ada didalam file gambar tersebut. Metode yang digunakan adalah melakukan teknik kriptografi terlebih dahulu menggunakan algoritma Blowfish “OpenPGP.Cipher.4”. Teks informasi yang telah terenkripsi tersebut kemudian dimasukkan pada pixel yang diambil dengan menggunakan metode Least Significant Bit Insertion (LSB).
APA, Harvard, Vancouver, ISO, and other styles
37

Dinesh, E., and S. M. Ramesh. "Security Aware Data Transaction Using Optimized Blowfish Algorithm in Cloud Environment." Journal of Circuits, Systems and Computers, July 18, 2020, 2150004. http://dx.doi.org/10.1142/s0218126621500043.

Full text
Abstract:
Cloud computing has become a growing technique due to its on-demand service and scalable features. Most of the applications of the cloud today are in data storage. Data protection and privacy have thus become a major concern. There are huge risks of storing transaction data on third-party hosts. Service providers need to make right investments in proving and ensuring appropriate security over time. Malicious users can exploit weak spots in the data protection model to increase unauthorized access to data. To overcome the problem, in this paper, security-aware data transaction on the cloud using the blowfish algorithm (BA) is proposed. To improve the security of the system, initially, the proposed system verifies the authentication of the user. After the authentication process, the uploaded data are initially split using a pattern-matching algorithm. Then, the separated data are encrypted with the help of BA. Finally, the encrypted data are stored in the cloud at an optimal location. This method is more secure as the data are column-separated and optimized in the cloud, so it is difficult to attack. This method is highly guaranteed because the user cannot recover the document without authentication checking. The performance of the proposed approach is analyzed in terms of different metrics, namely, memory, encryption and decryption time. The experimental results clearly say that the proposed method took minimum encryption time compared with the existing approach.
APA, Harvard, Vancouver, ISO, and other styles
38

Barhoom, Tawfiq, and Mahmoud Abu Shawish. "Text File Privacy on the Cloud Based on Diagonal Fragmentation and Encryption." Journal of Engineering Research and Technology 8, no. 1 (March 3, 2021). http://dx.doi.org/10.33976/jert.8.1/2021/3.

Full text
Abstract:
Despite the growing reliance on cloud services and software, privacy is somewhat difficult. We store our data on remote servers in cloud environments that are untrusted. If we do not handle the stored data well, data privacy can be violated with no awareness on our part. Although it requires expensive computation, encrypting the data before sending it appears to be a solution to this problem. So far, all known solutions to protect textual files using encryption algorithms fell short of privacy expectations. Thus is because encrypting cannot stand by itself. The encrypted data on the cloud server becomes full file in the hand causing the privacy of this data to be intrusion-prone, thus allowing intruders to access the file data once they can decrypt it. This study aimed to develop an effective cloud confidentiality model based on combining fragmentation and encryption of text files to compensate for reported deficiency in encryption methods. The fragmentation method used the strategy of dividing text files into two triangles through the axis. Whereas the encryption method used the Blowfish algorithm. The research concluded that high confidentiality is achieved by building a multi-layer model: encryption, chunk, and fragmentation of every chunk to prevent intruders from reaching the data even if they were able to decrypt the file. Using the privacy accuracy equation (developed for the purpose in this research), the model achieved accuracy levels of 96% and 90% when using 100 and 200 words in each chunk on small, medium, and large files respectively.
APA, Harvard, Vancouver, ISO, and other styles
39

"Security and Confidentiality of the Data using Block Level in Health Care System." International Journal of Recent Technology and Engineering 8, no. 2 (July 30, 2019): 2947–51. http://dx.doi.org/10.35940/ijrte.b2656.078219.

Full text
Abstract:
Nowadays rapid development of cloud computing in smart healthcare system has significantly improved the quality of health. However, data security and user privacy are a major concern for smart healthcare systems. These days any kind of data can be used for malicious purposes. Many harmful entities constantly try to gain access to the personal data of internet users. This data includes sensitive information that doctors store of patients and is often stored using some kind of third party cloud providing service that is not very secure. To take care of this issue, in this paper, Symmetric Balanced Incomplete Block Design (SBIBD) is utilized for key Security so that unauthorized client can’t get access to the data easily. It also allows the patients immediate and easy access to the data using unique user ID. This system makes use of double encryption using Blowfish algorithm to ensure maximum security of data and the concept of block level is used where data is stored using multiple blocks.
APA, Harvard, Vancouver, ISO, and other styles
40

Mr. Shrikanta Jogar and Mr. Darshan S Handral. "Secure File Storage on Cloud Using Hybrid Cryptography." International Journal of Advanced Research in Science, Communication and Technology, July 23, 2022, 540–51. http://dx.doi.org/10.48175/ijarsct-5861.

Full text
Abstract:
Cloud is used in various fields like industry, military, college, etc. for various services and storage of huge amount of data. Data stored in this cloud can be accessed or retrieved on the users request without direct access to the server computer. The rapidly increased use of cloud computing within the many organization and IT industries provides new software with low cost. Cloud computing is useful in terms of low cost and accessibility of knowledge. Cloud computing gives lot of advantages with low cost and of knowledge accessibility through Internet. Ensuring the safety of cloud computing may be a major think about the cloud computing environment, as users often store sensitive information with cloud storage providers, but these providers could be untrusted. So, sharing data in a secure manner while preserving data from an untrusted cloud remains a challenging issue. Our approach ensures the safety and privacy of client sensitive information by storing data across single cloud, using AES, triple DES and Blowfish algorithm.
APA, Harvard, Vancouver, ISO, and other styles
41

"Security Enhancement in Cryptography for Mobile Device Outsourced in Cloud Computing." International Journal of Innovative Technology and Exploring Engineering 9, no. 8 (June 10, 2020): 971–75. http://dx.doi.org/10.35940/ijitee.h6780.069820.

Full text
Abstract:
Mobile devices often store data in cloud computing storage based on the increasing availability of the users. But security is the major issue in cloud computing. Sensitive information is stored and provided across internet to make sure that the data is protected with security. In this paper, the concept of data privacy is given more importance with regard to the major problem of reducing outsourced data usage. Mobile computing has memory storage and power resources as limitations. But cryptography is a concept which provides some sort of security enhancement that ensures the authentication and the availability of data integrity with confidentiality. Certain algorithms are used for ensuring an increase in security such as AES, DES, and Blowfish. Experimental results are computed and analyzed to level up the performance using cryptographic algorithms. Results are shown in order to assure resistance among the above techniques. Choosing an apt algorithm will quench the requirements of the future.
APA, Harvard, Vancouver, ISO, and other styles
42

Kaviya, K., K. K. Shanthini, and M. Sujithra. "Evolving Cryptographic Approach for Enhancing Security of Resource Constrained Mobile Device Outsourced Data in Cloud Computing." International Journal of Scientific Research in Computer Science, Engineering and Information Technology, January 5, 2019, 101–6. http://dx.doi.org/10.32628/cseit195111.

Full text
Abstract:
Mobile cloud computing in the increasing popularity among users of mobile device enables to store their data in cloud. Security is the major concern when the sensitive information is stored and transferred across the internet. It is essential to make sure that the data is secured and protected. In this paper, we discussed the problem of privacy of data with reducing the resources usage. Moreover, mobile cloud computing has limitations in resources such as power energy, processor, Memory and storage. Cryptography ensures the confidentiality, authentication, availability, and integrity of the data. This is done through cryptographic algorithms such as Data Encryption Standard (DES), Blowfish and Advanced Encryption Standard (AES). The experimental results evaluated and compared the performance of the encryption algorithms. The performance metrics used are encryption and decryption time, CPU and Memory utilization. Evaluation results showed a significant improvement in reducing the resources, amongst all the techniques, choosing a suitable encryption algorithm based on different parameters that are best fit to the future user requirements is considered.
APA, Harvard, Vancouver, ISO, and other styles
43

Alenezi, Mohammed N., and Fawaz S. Al-Anzi. "A Study of Z-Transform Based Encryption Algorithm." International Journal of Communication Networks and Information Security (IJCNIS) 13, no. 2 (April 15, 2022). http://dx.doi.org/10.17762/ijcnis.v13i2.5052.

Full text
Abstract:
It has become increasingly important to ensure the protection of information, especially data in transit. Therefore, it is the primary goal of any encryption algorithm to safeguard the protection of information against security attacks. It is equally important to design high-performance solutions with affordable cost of implementation. Encryption algorithms are used to transform plain text to the ciphertext in order to protect privacy, prevent data fraud, and prevent unauthorized access of data in daily transactions. There are multiple types of encryption algorithms, each with its niche tactics to enhance security. For instance, different kinds of algorithms include but are not limited to the following: Blowfish, RSA, AES, DES, Triple DES. This paper contributes an efficient and secure encryption algorithm technique for information security based on Z transformation and XOR function known as the Z Transformation Encryption (ZTE) technique. To elaborate, this technique implements concepts of Z transformation and XOR operations at the source. The reverse process is applied at the receiving end of the transaction wherein the inverse of Z transformation and XOR is applied to reveal the original plain text message. The simulation of the proposed algorithm is conducted using the R language. The results show a promising performance comparing to other symmetric algorithms.
APA, Harvard, Vancouver, ISO, and other styles
44

"Two Layer Image Encryption using Symmetric Key Algorithms." International Journal of Innovative Technology and Exploring Engineering 9, no. 7 (May 10, 2020): 1056–59. http://dx.doi.org/10.35940/ijitee.g5285.059720.

Full text
Abstract:
Security of data (text, audio, and images) is becoming more complex with the increment in its amount. In order to upsurge the reliability, the captcha (Completely Automated Public Turing test to tell Computers and Humans Apart) is used to ensure authenticity. In contrast, even these captchas can be hacked and security can be easily impeached, aim of these captchas is to identify if the user is genuine or else if it is just a robot trying to spam the system. This paper presents auxiliary hybridization of AES and Blowfish cryptographic algorithms for image encipherment and decipherment. Here, AES is using Blowfish as its subroutine where Blowfish encrypts and decrypts the AES encoded image. This is then handed to AES for second level decryption. Here the image which is to be encrypted is applied to AES algorithm, its output is further used as an input for Blowfish algorithm. Output of this doubly encrypted image is then decrypted in the reverse order of encipherment. This auxiliary hybridization adds security to the image rendering it the capacity to become useful in highly important organizations. Private key cryptography uses single secret key at both, the sender and the receiver end. Using symmetric key cryptographic algorithm for this process makes the complete process fast and more secure in comparison to when asymmetric cryptographic algorithms are used for the same purpose. Moreover, symmetric key cryptographic algorithms are more suitable for larger files and images. These also help in maintaining the confidentiality of the data.
APA, Harvard, Vancouver, ISO, and other styles
45

"Progressing Biometric Security Concern with Blowfish Algorithm." International Journal of Innovative Technology and Exploring Engineering 8, no. 9S2 (August 31, 2019): 166–71. http://dx.doi.org/10.35940/ijitee.i1032.0789s219.

Full text
Abstract:
The world today is completely secured with most recent advancements. Consequently the security is still a huge issue. Biometric provides high security with more precision which recognizes the individual dependent on their physiological qualities of a person by utilizing their biometrics. It aims that the biometric will build security, dependability and agreeableness in the most recent innovation of PC framework. The mainstream MIPS based cryptography processor is utilized for equipment and programming items and guidelines require cryptography keys length for higher security level. Merging biometric with MIPS cryptography processor is as a possible arrangement. We utilize new way to deal with Network security utilizing MIPS constructed crypto processor situated in light of contactless palm vein biometric framework. This methodology considers NOC limitations and its topology. It gives greater security with less key length and there is no compelling reason to store any private key anyplace. Blow fish algorithm is more secure to analyze other symmetric key calculations, and deliver best outcome for less handling time and adjusts to build the key size of blowfish calculation.
APA, Harvard, Vancouver, ISO, and other styles
46

"FCNN Model for Diagnosis and Analysis of Symmetric Key Cryptosystem." Iraqi Journal for Computer Science and Mathematics, November 2, 2022, 53–61. http://dx.doi.org/10.52866/ijcsm.2023.01.01.006.

Full text
Abstract:
An important part of a cryptosystem is a cryptographic algorithm, which protects unauthorized attackers from obtaining private and sensitive data. This study is a research project on identifying cryptographic algorithms using deep learning techniques and categorizing cryptographic algorithms based on feature extraction. The research involves employing block cipher modes called electronic codebook with the encryption algorithms Blowfish and advanced encryption standard (AES), where the data will be encrypted using the same key and a different key. The model has been developed by changing the structure and parameters of the proposed model and the training rate of the data. This model will build several dense FCNN of n layers on regular fully connected neural networks. Its construction will consist of five hidden layers, with each layer consisting of 128 neurons and hidden layers activation Relu except for the output layer, which consists of two classifiers and the SoftMax activation function. FCNN is better able to classify big data. It is also more efficient in use, reducing complexity, with the ability to store training data. First, the fully connected neural network (FCNN) model was used to evaluate the categorization of the models. Then, all models, even the encryption forms, were evaluated utilizing true positive measurements for satisfactory classification of the identified encryption method and false positive measurements for incorrect classification. The effectiveness of the model was then calculated using the precision value, recall, loss, accuracy range, and F1-Score metrics using a confusion matrix. The FCNN model parameters will be changed to more effectively identify the encryption algorithm. In the proposed method, when using the same key, the accuracy was 81%, and when using a different key, the accuracy was 49%. The FCNN model’s adjusted weights and learning will be based on large data to define and assess encryption algorithms more effectively and efficiently
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography