research

Cloud Security using Blowfish and Key Management Encryption Algorithm

Abstract

In the present days security is the major goal in all applications. For securing data in cloud computing there are lot of techniques available. Various disadvantages in cloud are like security, data protection, network security, privacy concerns and are also prone to a variety of attacks like Denial of Service, IP spoofing etc. To overcome these attacks, we can use authentication, authorization, access control and encryption techniques.nbspA user can access cloud services as a utility service and begin to use them almost instantly. The fact that services are accessible any where any time lead to several risks. Some of the concerns are lack of confidentiality, integrity and authentication among the users of cloud and service providers. Main goal of my proposal is to provide security in cloud and protecting the data transmitted through various secure channels by providing security using encryption. The cryptographic algorithms like DES, AES, GOST 28147-89, CAST, RC6, SERPENT, and TWOFISH can be adopted for the optimization of data security in cloud computing

    Similar works

    Full text

    thumbnail-image

    Available Versions

    Last time updated on 09/07/2019