Survey of Blowfish Algorithm for Cloud

. Security is the study of encryption and decryption, data hiding, potential attacks, and performance evaluation. Many algorithms perform this purpose. Blowfish is a symmetric block cipher that uses the Feistel network. Although several works employed the Blowfish algorithm for the security of the cloud, there is still no article that lists previous studies. Cloud computing is the transmission of computer services such as servers, storage, databases, networking, software, analytics, and intelligence through the Internet ("the cloud") in order to provide faster innovation, more flexible resources, and cost savings. The most common issue with cloud computing is information security, privacy, confidentiality, and how the cloud provider ensures these services. This paper includes a survey of most previous works that were concerned with using the Blowfish algorithm in achieving cloud security


Literature Review
There are many scholars and researchers who have written on this topic, including Abdelrahman Shawki and Mohamed Qadri Sharouda, where cryptographic algorithms have been proposed to make cloud data more secure and fragile as well as pay attention to security issues and challenges. Comparisons were made between the following algorithms AES, DES, Blowfish and RSA to find the best algorithm to use in cloud computing to make cloud data secure and inaccessible to attackers [1]. So did researchers E.Dinesh & S.M.Ramesh where they presented a research paper providing statistical testing of randomness on Blowfish block blades. where the tests were performed on the parts of the Blowfish algorithm in (ECB) mode with all types of data [2]. Researcher Venkata Koti Reddy Gangireddy et al. also provided performance metrics such as confidentiality, reliability, and other identified resources. With cloud monitoring, processing time is lower and timely data delivery is guaranteed. [3] Researcher Venkata Koti Reddy Gangireddy also presented a paper that converts data into an unintelligible format using the Blowfish cipher system by expanding the input key into several sub-arrays of 4168 bytes. An array P consisting of eighteen 32-bit boxes, along with the S-boxes, are four 32-bit arrays with 256 entries each [4]. In this thesis, researcher Mohamed Khaled ElBeltagy presents double-layer security using Wolfram Mathematica® steganography and encryption techniques on 3D objects. At the first layer, in the encryption part, the data is encrypted using Blowfish technology with a key length of 256-bit. In the second layer, in the steganography part, the LSB . variable a technique was used to embed data in the wrapper object [5]. In this paper, researcher Ashwak Alabaichi introduces the process of security analysis. Security analysis is divided into two phases. The first stage is to check the entire RAF output, including the avalanche text and correlation coefficient. The second stage is to check the quality of the 3D dynamic s-square generated by RAF using the strict collapse criterion and the bit-independence criterion (BIC). In addition, the RAF algorithm is compared with the Blowfish algorithm [6]. As for Reynaldo R. Corpuz, he relied in his research on the (FYS) algorithm, also called (KS), to replace and modify the S-Box, and the function F was used to improve the BF algorithm to address this problem [7]. Here researcher Reynaldo R. Corpuz introduced the implementation and testing of a modified Blowfish algorithm using the Shuffle algorithm for encryption, decryption, and throughput.This study presented an application of a modified blowfish algorithm in cloud computing, Isabella State University, using the proposed system architecture as well as using an interface that adds security to the shared file through cloud computing [8]. Researchers K.Mohana Prabha and Dr.P.Vidhya Saraswathi have also developed the TH-KBBA mechanism for secure data access. At the registration stage, user information is entered and stored on the server. Then AS checks the user ID and password to select AU and Unauthorized user. Then install AS to CS by creating tickets. The ticket is encrypted using Blowfish cipher with a symmetric key. Then CS decrypts with a symmetric key that are shared by AS. Finally, CS verifies the user ID and provides the required data to CS [9]. Researchers Salma, Rashidah Funke Olanrewaju and others have proposed a structure that encrypts the file using a file of mixed algorithms such as AES (DAES) and Blowfish before serving the file in the cloud. This proposal can solve significant file security risks such as various attacks such as brute force and forced attack because it provides an authentication structure to verify file access from the cloud. Thus if it is used safely, it will provide a great advantage and overcome the disadvantages of security risks [10]. The researcher Shafi'i Muhammad Abdulhamid has also designed an application that ensures that no party can have the same unique identifier and each user must keep the secret of the unique identifier along with the secret key chosen by the user. The unique identifier helps the user to access and decrypt the stored data upon retrieval [11]. Researcher Srinivas Mudepalli also wrote a paper looking at ciphertext retrieval via cloud storage using some effective privacy techniques. To efficiently search ciphertext content, a derivation-based Porter Index and data stored on the cloud was created as an cryptographic model. Here Blowfish cipher and elliptic curve keys are used for secure data transmission [12]. Researchers V.Saranya and K.Kavitha also wrote a paper recommending a Blowfish algorithm aimed at key generation. At first, create the symmetric key for both encryption and decryption. After that, the data is stored correctly and securely by the user. This solution is based on the ABE-based naming system for privacy preservation and the ontology-based trait management system [13]. Researcher Mohaned Abduallah Elshaikh conducted research aimed at evaluating the performance of Blowfish by modifying the structure of the F function. The modified Blowfish will use only two S-boxes in the F function instead of the four used in Blowfish to compare encryption time and security. Encoding time and decoding time were calculated to compare between Blowfish and modified Blowfish [14]. In this paper, Adviti Chauhan and Jyoti Gupta researchers propose a new parallel cipher algorithm, which mixes and mutates from MD5 and Blowfish cipher schemes, which can upgrade security. The MD5-Blowfish hybrid cipher computation is created to overcome the shortcomings of symmetric cryptographic and hash function systems [15]. As well as a study by researcher Ashwak alabaichi, the study includes three phases: Design, implementation and verification In the first phase, 3D Dynamic S-Box, Dynamic P-box and F-Function were designed. The second stage is to implement a key to expand, encrypt and decrypt the data, as for verification, it includes evaluating the output of the new design using a random statistical test and coding analysis [16]. The aim of this research by researchers Vaibhav Poonia and Dr. Narendra Singh Yadav aims to improve and evaluate the Blowfish algorithm based on various parameters such as encryption quality, correlation coefficients, key sensitivity testing, and output file size. The 'f' function is modified by mixing XOR and the addition used in the original algorithm. Four cases are generated and analyzed [17]. The aim of this research by Ashwak alabaichi is to enhance the Blowfish algorithm. The research included three phases, algorithm design, implementation and evaluation. At the design stage, the dynamic 3D S-Box, the Dynamic Flip Box (P-Box), and the Festal (F-Function) function have been improved. The optimization included the integration of a cylindrical coordinate system (CCS) and a dynamic P-Box [18]. In this paper by researchers Rachna Arora and Anshu Parashar Cryptographic algorithms have been proposed to make cloud data secure, fragile, and given attention to security issues and challenges, and comparisons are 20 Technium Vol. 4, Issue 6 pp. 18-28 (2022) ISSN: 2668-778X www.techniumscience.com made between AES, DES, Blowfish and RSA to find the single best security algorithm, which should be used in computing Cloud to make cloud data secure and not hacked by attackers [20]. This paper by Ashwak alabaichi et al. presents the statistical test of randomness on Blowfish mass blades [21]. This thesis employs the Blowfish algorithm, which is suited for such situations because it is patented-free and has never been subjected to cryptanalysis since its inception, demonstrating that it provides a high level of security for the protection of patient data. The key size of the Blowfish algorithm employed is 256 bits. After encrypting an X-ray medical image, it appears that it is no longer recognizable, and the human visual system (HVS) was unable to distinguish any aspects of the encrypted image. This demonstrates that the algorithm in use is capable of maintaining patient and hospital confidentiality.

2-
Security aware data transaction using optimized blowfish algorithm in cloud environment The blowfish algorithm (BA) is used to propose security-aware data transactions in the cloud in this research. To increase the system's security, the proposed approach first checks the user's authentication. The uploaded data is initially separated using a pattern-matching algorithm after the authentication process. After that, BA is used to encrypt the separated data. Finally, the data is encrypted and saved in the cloud at the most appropriate location. This solution is safer since the data is columnseparated and optimized in the cloud, making it harder to hack. Because the user cannot recover the document without authentication, this method is highly secure. The process of security analysis is carried out in this work. There are two steps to the security analysis. The first step is to double-check the RAF's whole output, including the Avalanche text and correlation coefficient. The quality of the dynamic 3D s-box formed by RAF is checked in the second step using the rigorous avalanche criterion and the bit independence criterion (BIC). In addition, the Blowfish algorithm and the RAF method are contrasted. The blowfish algorithm assists the user in generating a unique Id for encrypting messages (m) and retrieving data from the cloud using the same key. The unique Id is utilized for data retrieval as a kind of authentication. The application ensures that no two parties have the same unique identifier, and each user must maintain the unique identifier as well as the secret key chosen by the user confidential. The unique Id also aids a user in gaining access to stored data and decrypting it once it is retrieved. This research looks into ciphertext retrieval through cloud storage, as well as some effective privacy techniques. Porter stemmingbased index has been created to effectively search ciphertext content, and the data has been stored in encrypted form on the cloud. Here For safe data transmission, Blowfish encryption and elliptic curve keys are used. When an authorized user sends a query to the cloud, the relevant files are encrypted and provided to the user. The user then provides the private key for the decryption process, and the files are decrypted by blowfish. When compared to traditional methods, our proposed solution outperforms them in terms of retrieval efficiency and time consumption.

13-A Modified Blowfish
Algorithm for Improving the Cloud Security V.Saranya1 and K.Kavitha

2017
The blowfish algorithm is recommended in this study for key generation. To begin, construct a symmetric key that can be used for both encryption and decryption. The data is then properly and securely kept by the user. This method is built on an ontology-based attribute management scheme and a privacy-preserving ABE-based name strategy. The ontologybased method allows for customizable attribute management while also reducing time consumption, storage costs, and increasing throughput. The ABE-based naming system provides the same high security level as CP-ABE in terms of security and privacy, but with attribute anonymity protection for policy privacy and adjustable attribute ranks. Experiments showed that the proposed methodology scored higher than the existing ABE technique in terms of encryption, efficiency, performance, and security. 14-Performance In this paper, encryption algorithms were proposed to make cloud data secure, and vulnerable, and to give concern to security issues, challenges, and comparisons between AES, DES, Blowfish, and RSA algorithms to find the best security algorithm that should be used in cloud computing to keep cloud data secure and not be hacked by attackers. Encryption algorithms are vital for cloud data security, and a study of several parameters used in algorithms revealed that the AES algorithm takes the least amount of time to process cloud data. The Blowfish algorithm uses the least amount of memory. The DES algorithm takes the shortest amount of time to encrypt data. RSA uses the most memory and takes the longest to encrypt. The statistical test of randomness on the Blowfish Block Cipher is presented in this study. The results also revealed that the ECB mode of the Blowfish method is ineffective for images and text files with long sequences of identical bytes.

Conclusion
In this research, all the theses and research papers dealing with the bloating fish algorithm and its relationship to cloud computing were collected, as no research paper was previously published that collects all previous studies on this topic, where a table was made that summarizes all these works and provides a brief summary of each work. In our future work we will modify the Blowfish algorithm to suit the security of cloud computing.