Friday, 6 September 2019

Development of Blowfish Encryption Scheme for Secure Data Storage in Public and Commercial Cloud Computing Environment

Volume 5 Issue 2 July - December 2018

Research Paper

Development of Blowfish Encryption Scheme for Secure Data Storage in Public and Commercial Cloud Computing Environment

Shafi’i Muhammad Abdulhamid*, Nafisat Abubakar Sadiq**, Abdullahi Mohammed ***, Nadim Rana****, Haruna Chiroma*****, Emmanuel Gbenga Dada ******
* Senior Lecturer and Head, Department of Cyber Security Science, Federal University of Technology Minna, Nigeria.
** Graduate, Department of Computer Science, Federal University of Technology (FUT), Minna, Nigeria.
*** Lecturer, Department of Computer Science, Ahmadu Bello University Zaria-Nigeria.
**** Senior Lecturer, College of Computer Science and Information Systems, Jazan University, Jazan, Kingdom of Saudi Arabia.
***** Senior Lecturer, Department of Computer Science, Federal College of Education (Technical), Gombe, Nigeria.
****** Faculty, Department of Computer Engineering, University of Maiduguri, Maiduguri, Nigeria.
Abdulhamid, S. M., Sadiq, N. A., Abdullahi, M., Rana, N., Chiroma, H., Dada, E.G (2018). Development of Blowfish Encryption Scheme for Secure Data Storage in Public and Commercial Cloud Computing Environment, i-manager's Journal on Cloud Computing 5(2), 1-10. https://doi.org/10.26634/jcc.5.2.15690

Abstract

Cloud computing is defined as the delivery of on-demand computing resources ranging from infrastructure application to datacenter over the internet on a pay-per-use basis. Most cloud computing applications does not guarantee high level security, such as privacy, confidentiality, and integrity of data because of third-party transition. This brings the development of Blowfish cloud encryption system that enables them to encrypt their data before storage in the cloud. Blowfish encryption scheme is a symmetric block cipher used to encrypt and decrypt data. Microsoft Azure cloud server was used to test the proposed encryption system. Users are able to encrypt their data and obtain a unique identification to help them retrieve encrypted data from the cloud storage facility as and when needed.

No comments:

Post a Comment