International Journal of Soft Computing And Artificial Intelligence (IJSCAI)
Follow Us On :
current issues
Volume-12,Issue-1  ( May, 2024 )
Statistics report
Jun. 2024
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 22
Paper Published : 242
No. of Authors : 695
  Journal Paper

Paper Title :
Secured Data Transfer For Cloud Using Blowfish

Author :Sumalatha Potteti, Namita Parati

Article Citation :Sumalatha Potteti ,Namita Parati , (2015 ) " Secured Data Transfer For Cloud Using Blowfish " , International Journal of Soft Computing And Artificial Intelligence (IJSCAI) , pp. 110-115, Volume-3,Issue-2

Abstract : As an emerging technology and business paradigm, Cloud computing platforms provide easy access to a company’s high-performance, computing and storage infrastructure through web services. Mainly cloud computing technology enables users/enterprises to eliminate the requirements for setting up of expensive computing infrastructure and reduces system’s operating costs. As a result, this technology is used by an increasing number of end users. On the other hand, existing security deficiencies and vulnerabilities of underlying technologies can leave an open door for intrusions. Therefore, cloud computing providers need to protect their user’s sensitive data from insider or outsider attacks by installing an intrusion detection system. Form the viewpoint of security, various risks and issues are identified in the area of Cloud Computing. There are various risks associated with the security but one of the major issues is the security of data being stored on the provider's cloud and privacy while the data is being transmitted. This paper deals with various issues associated with security and focus mainly on the data security and methods of providing security by data encryption. Various encryption methods of block cipher algorithms such as RSA, Blowfish are discussed for providing solutions to cloud security. Keywords - Cloud Computing, Intrusion Detection System Service, AES & RSA algorithm.

Type : Research paper

Published : Volume-3,Issue-2


Copyright: © Institute of Research and Journals

| PDF |
Viewed - 95
| Published on 2016-01-12
IRAJ Other Journals
IJSCAI updates
IJSCAI Volume-12,Issue-1(May,2024)
The Conference World