International Journal of Soft Computing And Artificial Intelligence (IJSCAI)
.
Follow Us On :
current issues
Volume-12,Issue-1  ( May, 2024 )
Statistics report
Apr. 2024
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 22
Paper Published : 240
No. of Authors : 689
  Journal Paper


Paper Title :
Secured Data Transfer For Cloud Using Blowfish

Author :Sumalatha Potteti, Namita Parati

Article Citation :Sumalatha Potteti ,Namita Parati , (2015 ) " Secured Data Transfer For Cloud Using Blowfish " , International Journal of Soft Computing And Artificial Intelligence (IJSCAI) , pp. 110-115, Volume-3,Issue-2

Abstract : As an emerging technology and business paradigm, Cloud computing platforms provide easy access to a company’s high-performance, computing and storage infrastructure through web services. Mainly cloud computing technology enables users/enterprises to eliminate the requirements for setting up of expensive computing infrastructure and reduces system’s operating costs. As a result, this technology is used by an increasing number of end users. On the other hand, existing security deficiencies and vulnerabilities of underlying technologies can leave an open door for intrusions. Therefore, cloud computing providers need to protect their user’s sensitive data from insider or outsider attacks by installing an intrusion detection system. Form the viewpoint of security, various risks and issues are identified in the area of Cloud Computing. There are various risks associated with the security but one of the major issues is the security of data being stored on the provider's cloud and privacy while the data is being transmitted. This paper deals with various issues associated with security and focus mainly on the data security and methods of providing security by data encryption. Various encryption methods of block cipher algorithms such as RSA, Blowfish are discussed for providing solutions to cloud security. Keywords - Cloud Computing, Intrusion Detection System Service, AES & RSA algorithm.

Type : Research paper

Published : Volume-3,Issue-2


DOIONLINE NO - IJSCAI-IRAJ-DOIONLINE-3653   View Here

Copyright: © Institute of Research and Journals

| PDF |
Viewed - 95
| Published on 2016-01-12
   
   
IRAJ Other Journals
IJSCAI updates
IJSCAI Volume-11,Issue-2(Nov,2023)
The Conference World

JOURNAL SUPPORTED BY