Survey of Blowfish Algorithm for Cloud

Main Article Content

Shamil Ezadeen
Auday H. Alwattar

Abstract

Abstract. Security is the study of encryption and decryption, data hiding, potential attacks, and performance evaluation. Many algorithms perform this purpose. Blowfish is a symmetric block cipher that uses the Feistel network. Although several works employed the Blowfish algorithm for the security of the cloud, there is still no article that lists previous studies. Cloud computing is the transmission of computer services such as servers, storage, databases, networking, software, analytics, and intelligence through the Internet ("the cloud") in order to provide faster innovation, more flexible resources, and cost savings. The most common issue with cloud computing is information security, privacy, confidentiality, and how the cloud provider ensures these services. This paper includes a survey  of most previous works that were concerned with using the Blowfish algorithm in achieving cloud security


Article Details

How to Cite
Ezadeen, S., & Alwattar, A. H. (2022). Survey of Blowfish Algorithm for Cloud . Technium: Romanian Journal of Applied Sciences and Technology, 4(6), 18–28. https://doi.org/10.47577/technium.v4i6.6791
Section
Articles

References

Sharouda, A. S. M. Q. (2021). Medical Image Encryption Employing Blowfish.

Dinesh, E., & Ramesh, S. M. (2021). Security aware data transaction using optimized blowfish algorithm in cloud environment. Journal of Circuits, Systems and Computers, 30(01), 2150004.

Gangireddy, V. K. R., Kannan, S., & Subburathinam, K. (2021). Implementation of enhanced blowfish algorithm in cloud environment. Journal of Ambient Intelligence and Humanized Computing, 12(3), 3999-4005.

ElBeltagy, M. K. (2019). StegoCrypt3D: 3D Object and Blowfish.

ALabaichi, A. (2018). Evaluation of A dynamic 3D S-Box based on Cylindrical Coordinate System for Blowfish Algorithm. Life Science Journal, 15(10).

Sadiq, N. A., Abdullahi, M., Rana, N., Chiroma, H., & Dada, E. G. (2018). Development of blowfish encryption scheme for secure data storage in public and commercial cloud computing environment. i-Manag J Cloud Comput, 5, 1.

]Olanrewaju, R. F., Abdullah, K., & Darwis, H. (2018, November). Enhancing Cloud Data Security Using Hybrid of Advanced Encryption Standard and Blowfish Encryption Algorithms. In 2018 2nd East Indonesia Conference on Computer and Information Technology (EIConCIT) (pp. 18-23). IEEE.

Corpuz, R. R., Gerardo, B. D., & Medina, R. P. (2018, December). Using a modified approach of blowfish algorithm for data security in cloud computing. In Proceedings of the 6th International Conference on Information Technology: IoT and Smart City (pp. 157-162).

Corpuz, R. R., Gerardo, B. D., & Medina, R. P. (2018, December). A modified approach of Blowfish algorithm based on S-box permutation using shuffle algorithm. In Proceedings of the 2018 VII International Conference on Network, Communication and Computing (pp. 140-145).

Olanrewaju, R. F., Abdullah, K., & Darwis, H. (2018, November). Enhancing Cloud Data Security Using Hybrid of Advanced Encryption Standard and Blowfish Encryption Algorithms. In 2018 2nd East Indonesia Conference on Computer and Information Technology (EIConCIT) (pp. 18-23). IEEE.

Prabha, K. M., & Saraswathi, P. V. (2018, August). Tiger hash kerberos biometric blowfish user authentication for secured data access in cloud. In 2018 2nd International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC) I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC), 2018 2nd International Conference on (pp. 145-151). IEEE.

Mudepalli, S., Rao, V. S., & Kumar, R. K. (2017, June). An efficient data retrieval approach using blowfish encryption on cloud ciphertext retrieval in cloud computing. In 2017 International conference on intelligent computing and control systems (ICICCS) (pp. 267-271). IEEE.

Elshaikh, M. A. (2017). Performance Evaluation of Blowfish Encryption Algorithm (Doctoral dissertation, Sudan University of Science & Technology).

Chauhan, A., & Gupta, J. (2017, September). A novel technique of cloud security based on hybrid encryption by Blowfish and MD5. In 2017 4th International conference on signal processing, computing and control (ISPCC) (pp. 349-355). IEEE.

Saranya, V., & Kavitha, K. (2017). A modified blowfish algorithm for improving the cloud security. Elsiyum J, 4(3), 1-6.

Alabaichi, A. M. (2015). A dynamic 3D S-box based on cylindrical coordinate system for blowfish algorithm. Indian Journal of Science and Technology, 8(30).

Poonia, V., & Yadav, N. S. (2015, January). Analysis of modified Blowfish Algorithm in different cases with various parameters. In 2015 International Conference on Advanced Computing and Communication Systems (pp. 1-5). IEEE.

Alabaichi, A. M. (2014). An enhanced Blowfish Algorithm based on cylindrical coordinate system and dynamic permutation box (Doctoral dissertation, Universiti Utara Malaysia).

Hashizume, K., Rosado, D. G., Fernandez-Medina, E., & Fernandez, E. B. (2013). An analysis of security issues for cloud computing. Journal of internet services and applications, 4(1), 1-13.

Rosado DG, Gomez R, Mellado D, Fernandez-Medina E (2012) Security analysis in the migration to cloud environments. Future Internet 4(2):469-487

KPMG (2010) From hype to future: KPMG's 2010 Cloud Computing survey.. Available: http://www.techrepublic.com/whitepapers/from-hype-to-futurekpmgs-2010-cloud-computing-survey/2384291

Fontaine, C., & Galand, F. (2007). A survey of homomorphic encryption for nonspecialists. EURASIP Journal on Information Security, 2007, 1-10.

Qarkaxhija, J. (2020). Using Cloud Computing as an Infrastructure Case Study-Microsoft Azure.

Basi, H. (2021). Improving the Availability of the Education Sector in Iraq over the Cloud Computing.

Ali, A. I. M. (2021). E-Governance System Challenges and Cloud Computing Benefits in E-Governance.

Similar Articles

<< < 1 2 3 4 5 6 

You may also start an advanced similarity search for this article.