Research Article | OPEN ACCESS
Hybrid Blow Fish Algorithm-IPSO based Signing Method for Secure Storage and Computation Process
T.N. Ravi and Dr. SharmilaSankar
Department of Computer Science and Engineering, B.S. AbdurRahman University, Chennai, India
Research Journal of Applied Sciences, Engineering and Technology 2016 8:847-856
Received: September 3, 2015 | Accepted: November 27, 2015 | Published: April 15, 2016
Abstract
The aim of the research is cloud security and privacy in order to attain efficient secure storage and secure computation in cloud computing. We suggest a signing method for secure storage and computation process in this study. The proposed hybrid blow fish algorithm is to develop the secure storage of file. Here blowfish algorithm is hybrid with improved particle swarm optimization technique for the intention of secure storage and computation. Blow fish algorithm is applied for encryption and decryption process of our proposed method. In this method inserting a renew key to the file, as if the policy time of the file is over it will routinely erase the file from the cloud server. So that the implemented method employed one renew key for the renewal process of file. Based on this, the executed method is accomplishing high security level. Our method will be implemented in Cloud simulator in the working platform of Java.
Keywords:
Blow fish algorithm, computation, encryption and decryption, optimization, particle swarm optimization , policy renewal,
References
-
Banyal, R.K., P. Jain and V.K. Jain, 2013. Multi-factor authentication framework for cloud computing. Proceeding of 5th IEEE International Conference on Computational Intelligence, Modelling and Simulation (CIMSim), pp: 105-110.
CrossRef -
Behl, A. and K. Behl, 2012. An analysis of cloud computing security issues. Proceeding of 2012 World Congress on Information and Communication Technologies (WICT, 2012), pp: 109-114.
CrossRef -
Chen, J., X. Wu, S. Zhang, W. Zhang and Y. Niu, 2012. A decentralized approach for implementing identity management in cloud computing. Proceeding of the 2nd International Conference on Cloud and Green Computing (CGC, 2012), pp: 770-776.
CrossRef -
Emam, A.H.M., 2013. Additional authentication and authorization using registered email-ID for cloud computing. Int. J. Soft Comput. Eng., 3(2): 110-113.
-
Moghaddam, F.F., S.G. Moghaddam, S. Rouzbeh, S.K. Araghi, N.M. Alibeigi et al., 2014. A scalable and efficient user authentication scheme for cloud computing environments. Proceeding of IEEE Region 10 Symposium, pp: 508-513.
CrossRef -
Nafi, K.W., T.S. Kar, S.A. Hoque and M.M.A. Hashem, 2012. A newer user authentication, file encryption and distributed server based cloud computing security architecture. Int. J. Adv. Comput. Sci. Appl., 3(10): 181-186.
-
Padhy, R.P., M.R. Patra and S.C. Satapathy, 2011. Cloud computing: Security issues and research challenges. Int. J. Comput. Sci. Inform. Technol. Secur., 1(2):136-146.
-
Piplode, R. and U.K. Singh, 2012. An overview and study of security issues & challenges in cloud computing. Int. J. Adv. Res. Comput. Sci. Software Eng., 2(9): 115-120.
-
Ranjith, R. and D. Kayathri Devi, 2013. Secure cloud storage using decentralized access control with anonymous authentication. Int. J. Adv. Res. Comput. Commun. Eng., 2(11): 4262-4266.
-
Ray, I., K. Belyaev, M. Strizhov, D. Mulamba and M. Rajaram, 2013. Secure logging as a service-delegating log management to the cloud. IEEE Syst. J., 7(2): 323-334.
CrossRef -
Ruj, S., M. Stojmenovic and A. Nayak, 2012. Privacy preserving access control with authentication for securing data in clouds. Proceeding of the 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid), pp: 556-563.
CrossRef -
Ruj, S., M. Stojmenovic and A. Nayak, 2014. Decentralized access control with anonymous authentication of data stored in clouds. IEEE T. Parall. Distr., 25(2): 384-394.
CrossRef -
Sánchez, R., F. Almenares, P. Arias, D. Díaz-Sánchez and A. Marin, 2012. Enhancing privacy and dynamic federation in IDM for consumer cloud computing. IEEE T. Consum. Electr., 58(1): 95-103.
CrossRef -
Sundareswaran, S., A. Squicciarini and D. Lin, 2012. Ensuring distributed accountability for data sharing in the cloud. IEEE T. Depend. Secure, 9(4): 556-568.
CrossRef -
Tan, X. and B. Ai, 2011. The issues of cloud computing security in high-speed railway. Proceeding of International Conference on Electronic and Mechanical Engineering and Information Technology, 8: 4358-4363.
CrossRef -
Varadharajan, V. and U. Tupakula, 2014. Security as a service model for cloud environment. IEEE T. Network Serv. Manage., 11(1): 60-75.
CrossRef -
Wang, Q., C. Wang, K. Ren, W. Lou and J. Li, 2011. Enabling public auditability and data dynamics for storage security in cloud computing. IEEE T. Parall. Disr., 22(5): 847-859.
CrossRef -
Yan, G., D. Wen, S. Olariu and M.C. Weigle, 2013. Security challenges in vehicular cloud computing. IEEE T. Intell. Transp., 14(1): 284-294.
CrossRef -
Yang, J., N. Xiong, A.V. Vasilakos, Z. Fang, D. Park, X. Xu, S. Yoon, S. Xie and Y. Yang, 2011. A fingerprint recognition scheme based on assembling invariant moments for cloud computing communications. IEEE Syst. J., 5(4): 574-583.
CrossRef -
Yassin, A.A., H. Jin, A. Ibrahim and D. Zou, 2012. Anonymous password authentication scheme by using digital signature and fingerprint in cloud computing. Proceeding of the 2nd International Conference on Cloud and Green Computing (CGC, 2012), pp: 282-289.
CrossRef -
Zhao, F., C. Li and C.F. Liu, 2014. A cloud computing security solution based on fully homomorphic encryption. Proceeding of the 16th International Conference on Advanced Communication Technology (ICACT), pp: 485-488.
CrossRef -
Zwattendorfer, B. and A. Tauber, 2012. Secure cloud authentication using eIDs. Proceeding of the 2nd International Conference on Cloud Computing and Intelligent Systems (CCIS, 2012), 1: 397-401.
CrossRef Direct Link
Competing interests
The authors have no competing interests.
Open Access Policy
This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
Copyright
The authors have no competing interests.
|
|
|
ISSN (Online): 2040-7467
ISSN (Print): 2040-7459 |
|
Information |
|
|
|
Sales & Services |
|
|
|