Hybrid Cryptosystem using Modified Blowfish Algorithm and SHA Algorithm on Public Cloud

Aakash Gore, S. S., Preetesh Purohit
2016 International Journal of Computer Applications  
Cloud computing has shaped the conceptual and infrastructural basis for tomorrow's computing. The worldcomputing infrastructure is quickly moving towards cloudbased design. Whereas it's important to require benefits of cloud based computing by suggests that of deploying it in varied sectors, the security aspects during a cloud based computing environment remains at the core of interest. Cloud based services and service providers are being evolved, that has resulted in a new business trend
more » ... usiness trend supported Cloud Technology. With the introduction of various cloud based services and Geographically distributed cloud service providers, Store sensitive data usually in remote servers with the chances of being exposed to unauthorized parties. If security isn't robust and consistent, benefits that cloud computing have to provide will have little believability. This paper presents an approach, which is based on modified blowfish algorithm and SHA algorithm for the security purpose on the cloud environment.
doi:10.5120/ijca2016912275 fatcat:r6pfxcurbvakxbqcxw3hqdzuzm