A novel technique of cloud security based on hybrid encryption by Blowfish and MD5

The networks have moved worldwide and information has been considered in the digital form of bits and bytes. Critical information is stored, refined and sent in digital form on personal computers. Since information performs such an essential role, competition are purposing the personal computers for opening up communication programs to either swipe the hypersensitive information or even to agitate the critical information system. There is absolutely no differentiation of cloud aspect or client aspect encryption, so it diminishes the information security. To attain the goals of security system, the encryption algorithms must definitely provide enough power with high security put in place within an acceptable speed restriction. Therefore, the performance analysis becomes very important to the prevailing encryption algorithms. This paper proposes a novel parallel cryptographic algorithm, blending and changing from MD5 and Blowfish encryption schemes, which can upgrade security. A hybrid MD5-Blowfish cryptographic calculation is created to defeat the shortcoming from symmetric block cryptographic and hash function schemes.

[1]  Seungmin Kang,et al.  A Security-Aware Data Placement Mechanism for Big Data Cloud Storage Systems , 2016, 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS).

[2]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[3]  Gunasekaran Manogaran,et al.  MetaCloudDataStorage Architecture for Big Data Security in Cloud Computing , 2016 .

[4]  Jianfeng Ma,et al.  A Secure Data Self-Destructing Scheme in Cloud Computing , 2014, IEEE Transactions on Cloud Computing.

[5]  Miao Zhou,et al.  Data security and integrity in cloud computing , 2013 .

[6]  Keke Gai,et al.  Proactive user-centric secure data scheme using attribute-based semantic access controls for mobile clouds in financial industry , 2018, Future Gener. Comput. Syst..

[7]  Rajkumar Buyya,et al.  An efficient and secure privacy-preserving approach for outsourced data of resource constrained mobile devices in cloud computing , 2016, J. Netw. Comput. Appl..

[8]  Keke Gai,et al.  Privacy-Aware Adaptive Data Encryption Strategy of Big Data in Cloud Computing , 2016, 2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud).

[9]  Keke Gai,et al.  Intelligent cryptography approach for secure distributed big data storage in cloud computing , 2017, Inf. Sci..

[10]  Keke Gai,et al.  Intercrossed Access Controls for Secure Financial Services on Multimedia Big Data in Cloud Systems , 2016, ACM Trans. Multim. Comput. Commun. Appl..

[11]  Ramadoss Balakrishnan,et al.  Attribute Based Encryption Using Quadratic Residue for the Big Data in Cloud Environment , 2016, ICIA.

[12]  Muthu Ramachandran,et al.  Towards performance evaluation of cloud service providers for cloud data security , 2016, Int. J. Inf. Manag..

[13]  Rajkumar Buyya,et al.  Dynamic remote data auditing for securing big data storage in cloud computing , 2017, Inf. Sci..

[14]  Jinjun Chen,et al.  A security framework in G-Hadoop for big data computing across distributed Cloud data centres , 2014, J. Comput. Syst. Sci..

[15]  Jinjun Chen,et al.  A hybrid approach for scalable sub-tree anonymization over big data using MapReduce on cloud , 2014, J. Comput. Syst. Sci..