Hybrid Cryptosystem using Modified Blowfish Algorithm and SHA Algorithm on Public Cloud

  • Gore A
  • S. S
  • Purohit P
N/ACitations
Citations of this article
8Readers
Mendeley users who have this article in their library.

Abstract

Cloud computing has shaped the conceptual and infrastructural basis for tomorrow's computing. The world-computing infrastructure is quickly moving towards cloud-based design. Whereas it's important to require benefits of cloud based computing by suggests that of deploying it in varied sectors, the security aspects during a cloud based computing environment remains at the core of interest. Cloud based services and service providers are being evolved, that has resulted in a new business trend supported Cloud Technology. With the introduction of various cloud based services and Geographically distributed cloud service providers, Store sensitive data usually in remote servers with the chances of being exposed to unauthorized parties. If security isn't robust and consistent, benefits that cloud computing have to provide will have little believability. This paper presents an approach, which is based on modified blowfish algorithm and SHA algorithm for the security purpose on the cloud environment.

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Gore, A., S., S., & Purohit, P. (2016). Hybrid Cryptosystem using Modified Blowfish Algorithm and SHA Algorithm on Public Cloud. International Journal of Computer Applications, 155(3), 6–10. https://doi.org/10.5120/ijca2016912275

Readers over time

‘17‘18‘19‘22‘2401234

Readers' Seniority

Tooltip

Professor / Associate Prof. 3

100%

Readers' Discipline

Tooltip

Computer Science 6

100%

Save time finding and organizing research with Mendeley

Sign up for free
0