##plugins.themes.academic_pro.article.main##

Abstract

Abstract: - Cloud provides enormous capacity of storage for cloud users. It is more reliable and flexible to users to store and retrieve their data at anytime and anywhere. It is an increasingly growing technology. Nowadays, many enterprises have started using cloud storage due to its advantages. Even though the cloud continues to gain popularity in usability and attraction, the problems lie in data security, data confidentiality, privacy and other data protection issues. Security and Confidentiality of data stored in the cloud are major setbacks in the field of Cloud Computing. Security and Confidentiality are the key issues for cloud storage. This paper proposes a Blowfish encryption algorithm to address the security and Confidentiality issue in cloud storage in order to protect the data stored in the cloud.

Keywords: Cloud Storage, Security, Confidentiality, Encryption Algorithm, Cryptography

 

##plugins.themes.academic_pro.article.details##

How to Cite
Subhash, S. B. (2014). Data Confidentiality in Cloud Computing with Blowfish Algorithm. International Journal of Emerging Trends in Science and Technology, 1(01). Retrieved from https://igmpublication.org/ijetst.in/index.php/ijetst/article/view/2

References

References
[1]International Journal of Advanced Research in Computer and Communication EngineeringVol. 2, Issue 8, August 2013 Dr. L. Arockiam1, S. Monikandan2
[2] IJCSI International Journal of Computer Science Issues, Vol. 10, Issue 1, No 1, January 2013ISSN (Print): 1694-0784 | ISSN (Online): 1694-0814 Mohit Marwaha1, Rajeev Bedi2
[3] International Association of Scientific Innovation and Research (IASIR) Rashmi Nigoti1, Manoj Jhuria2 Dr.Shailendra Singh3
[4] JECET; June – August-2013; Vol.2.No.3, 883-888. Jitendra Singh Rajawat1 and Sanjay Gaur2
[5] AN OVERVIEW OF THE SECURITY CONCERNS IN ENTERPRISE CLOUD COMPUTING by Anthony Bisong and Syed (Shawon) M. Rahman at International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.1, January 2011
[6] Cloud Security Alliance: Security Guidance Critical Areas of Focus in Cloud Computing, http://www.cloudsecurityalliance.org/guidance/csaguide.pdf. April 2009.

[7] Cloud computing and Confidentiality, W. Pieters and Prof. Dr. P.H. Hartel, University of Twente.s

[8] Management and Security for Grid, Cloud and Cognitive Networks by Carlos B. Westphall, Carla M.Westphall,FernandoL.Koch: http://www.fsma.edu.br/si/sistemas.html

[9] Enhancing Security in Cloud computing using Public Key Cryptography with Matrices Birendra Goswami & Dr. S. N. Singh: www.ijera.com Vol. 2, Issue 4, July-August 2012
[10] Improving the Security of Cloud Computing using Trusted Computing Technology by P. Senthil, N. Boopal & R. Vanathi : www.ijmer.com Vol.2, Issue.1, Jan-Feb 2012.
[11] http://en.wikipedia.org/wiki/Cloud_computing

[12] http://www.techno-pulse.com/ Cloud Computing for Beginners

[13] Security and Privacy in Cloud Computing (Lecture 1, 01/25/2010) by Ragib Hasan at Johns Hopkins Universityen.600.412

[14] USCERT-Cloud Computing Huth Cebula

[15] ttp://en.wikipedia.org/wiki/Trusted_Computing