Home            Contact us            FAQs
    
      Journal Home      |      Aim & Scope     |     Author(s) Information      |      Editorial Board      |      MSP Download Statistics

     Research Journal of Applied Sciences, Engineering and Technology


Hybrid Blow Fish Algorithm-IPSO based Signing Method for Secure Storage and Computation Process

T.N. Ravi and Dr. SharmilaSankar
Department of Computer Science and Engineering, B.S. AbdurRahman University, Chennai, India
Research Journal of Applied Sciences, Engineering and Technology  2016  8:847-856
http://dx.doi.org/10.19026/rjaset.12.2785  |  © The Author(s) 2016
Received: September ‎3, ‎2015  |  Accepted: November ‎27, ‎2015  |  Published: April 15, 2016

Abstract

The aim of the research is cloud security and privacy in order to attain efficient secure storage and secure computation in cloud computing. We suggest a signing method for secure storage and computation process in this study. The proposed hybrid blow fish algorithm is to develop the secure storage of file. Here blowfish algorithm is hybrid with improved particle swarm optimization technique for the intention of secure storage and computation. Blow fish algorithm is applied for encryption and decryption process of our proposed method. In this method inserting a renew key to the file, as if the policy time of the file is over it will routinely erase the file from the cloud server. So that the implemented method employed one renew key for the renewal process of file. Based on this, the executed method is accomplishing high security level. Our method will be implemented in Cloud simulator in the working platform of Java.

Keywords:

Blow fish algorithm, computation, encryption and decryption, optimization, particle swarm optimization , policy renewal,


References

  1. Banyal, R.K., P. Jain and V.K. Jain, 2013. Multi-factor authentication framework for cloud computing. Proceeding of 5th IEEE International Conference on Computational Intelligence, Modelling and Simulation (CIMSim), pp: 105-110.
    CrossRef    
  2. Behl, A. and K. Behl, 2012. An analysis of cloud computing security issues. Proceeding of 2012 World Congress on Information and Communication Technologies (WICT, 2012), pp: 109-114.
    CrossRef    
  3. Chen, J., X. Wu, S. Zhang, W. Zhang and Y. Niu, 2012. A decentralized approach for implementing identity management in cloud computing. Proceeding of the 2nd International Conference on Cloud and Green Computing (CGC, 2012), pp: 770-776.
    CrossRef    
  4. Emam, A.H.M., 2013. Additional authentication and authorization using registered email-ID for cloud computing. Int. J. Soft Comput. Eng., 3(2): 110-113.
  5. Moghaddam, F.F., S.G. Moghaddam, S. Rouzbeh, S.K. Araghi, N.M. Alibeigi et al., 2014. A scalable and efficient user authentication scheme for cloud computing environments. Proceeding of IEEE Region 10 Symposium, pp: 508-513.
    CrossRef    
  6. Nafi, K.W., T.S. Kar, S.A. Hoque and M.M.A. Hashem, 2012. A newer user authentication, file encryption and distributed server based cloud computing security architecture. Int. J. Adv. Comput. Sci. Appl., 3(10): 181-186.
  7. Padhy, R.P., M.R. Patra and S.C. Satapathy, 2011. Cloud computing: Security issues and research challenges. Int. J. Comput. Sci. Inform. Technol. Secur., 1(2):136-146.
  8. Piplode, R. and U.K. Singh, 2012. An overview and study of security issues & challenges in cloud computing. Int. J. Adv. Res. Comput. Sci. Software Eng., 2(9): 115-120.
  9. Ranjith, R. and D. Kayathri Devi, 2013. Secure cloud storage using decentralized access control with anonymous authentication. Int. J. Adv. Res. Comput. Commun. Eng., 2(11): 4262-4266.
  10. Ray, I., K. Belyaev, M. Strizhov, D. Mulamba and M. Rajaram, 2013. Secure logging as a service-delegating log management to the cloud. IEEE Syst. J., 7(2): 323-334.
    CrossRef    
  11. Ruj, S., M. Stojmenovic and A. Nayak, 2012. Privacy preserving access control with authentication for securing data in clouds. Proceeding of the 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid), pp: 556-563.
    CrossRef    
  12. Ruj, S., M. Stojmenovic and A. Nayak, 2014. Decentralized access control with anonymous authentication of data stored in clouds. IEEE T. Parall. Distr., 25(2): 384-394.
    CrossRef    
  13. Sánchez, R., F. Almenares, P. Arias, D. Díaz-Sánchez and A. Marin, 2012. Enhancing privacy and dynamic federation in IDM for consumer cloud computing. IEEE T. Consum. Electr., 58(1): 95-103.
    CrossRef    
  14. Sundareswaran, S., A. Squicciarini and D. Lin, 2012. Ensuring distributed accountability for data sharing in the cloud. IEEE T. Depend. Secure, 9(4): 556-568.
    CrossRef    
  15. Tan, X. and B. Ai, 2011. The issues of cloud computing security in high-speed railway. Proceeding of International Conference on Electronic and Mechanical Engineering and Information Technology, 8: 4358-4363.
    CrossRef    
  16. Varadharajan, V. and U. Tupakula, 2014. Security as a service model for cloud environment. IEEE T. Network Serv. Manage., 11(1): 60-75.
    CrossRef    
  17. Wang, Q., C. Wang, K. Ren, W. Lou and J. Li, 2011. Enabling public auditability and data dynamics for storage security in cloud computing. IEEE T. Parall. Disr., 22(5): 847-859.
    CrossRef    
  18. Yan, G., D. Wen, S. Olariu and M.C. Weigle, 2013. Security challenges in vehicular cloud computing. IEEE T. Intell. Transp., 14(1): 284-294.
    CrossRef    
  19. Yang, J., N. Xiong, A.V. Vasilakos, Z. Fang, D. Park, X. Xu, S. Yoon, S. Xie and Y. Yang, 2011. A fingerprint recognition scheme based on assembling invariant moments for cloud computing communications. IEEE Syst. J., 5(4): 574-583.
    CrossRef    
  20. Yassin, A.A., H. Jin, A. Ibrahim and D. Zou, 2012. Anonymous password authentication scheme by using digital signature and fingerprint in cloud computing. Proceeding of the 2nd International Conference on Cloud and Green Computing (CGC, 2012), pp: 282-289.
    CrossRef    
  21. Zhao, F., C. Li and C.F. Liu, 2014. A cloud computing security solution based on fully homomorphic encryption. Proceeding of the 16th International Conference on Advanced Communication Technology (ICACT), pp: 485-488.
    CrossRef    
  22. Zwattendorfer, B. and A. Tauber, 2012. Secure cloud authentication using eIDs. Proceeding of the 2nd International Conference on Cloud Computing and Intelligent Systems (CCIS, 2012), 1: 397-401.
    CrossRef    Direct Link

Competing interests

The authors have no competing interests.

Open Access Policy

This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.

Copyright

The authors have no competing interests.

ISSN (Online):  2040-7467
ISSN (Print):   2040-7459
Submit Manuscript
   Information
   Sales & Services
Home   |  Contact us   |  About us   |  Privacy Policy
Copyright © 2024. MAXWELL Scientific Publication Corp., All rights reserved