Secure Online Cloud Data Storage System Using Blowfish Algorithm
N.Jayapandian and A.M.J.Md. Zubair Rahman
Corresponding Author : N.Jayapandian,
Department of Computer Science & Engg, Knowledge Institute of Technology, Salem, India.
Email ID : firstname.lastname@example.org
Received : 2016-12-15 Accepted : 2017-02-02 Published : 2017-02-02
Abstract : The Government set aside several relief schemes for people, who are affecting in natural disasters like earthquakes, floods, cyclones and so on. The relief funds aided for the people those who are suffering in disaster. Initially, this endowment is helpful for surfers to get their basic necessary services. The benefits of this fund are transacted to sufferers through officers or politicians. But, these funds are not properly reached to the correct hands. Those funds are misused and corrupted by wrong persons. Because, the duplication of the government proofs like ration card, voter id, and so on are getting easily to corrupt the fund. To overcome that, we enhance some security levels for fund transaction through online using cloud computing. The three security levels of the proposed schemes are data collection, encryption and face detection. First, users must sign up or create an account in the relief fund transaction form. After that, the user should submit the details like family, bank details, documents that listed in that module. This submission is saved in cloud server, so it could be taken or seen from anywhere. Second, the submitted details are encrypted for more protection. Third, the user face must be detected using web cameras. All these levels is processed under a service level agreement (SLA); it is the contract between the cloud service provider (CSP) and the customer. The service provider must give assurance that, the above documents that the user submitted in cloud server will not be corrupted by any hackers. These three layers are called as tri-level security. The proposed design supports continued safe and efficient security measures, including uploaded proofs, encrypted data, and detect consumer face. By using our proposed system, hackers cannot get the money only the authorized person can receive the fund. So that, the rate of corruption will be low and also the funds will properly reach the sufferer people. Here we use Blowfish algorithm for encryption process, also we compare blowfish and hash chain algorithm. The proposed scheme the combination of face detection and blowfish algorithm give highest security level for cloud environments.
Keywords : Blowfish algorithm, Hash Chain algorithm, Cloud Computing, Encryption, Data Storage
Citation : N.Jayapandian et al. (2016). Secure Online Cloud Data Storage System Using Blowfish Algorithm, J. of Advancement in Engineering and Technology, V4I3. DOI : 10.5281/zenodo.918341
Copyright : © 2017 N.Jayapandian. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
Volume / Issue
ScienceQ Publishing GroupDownload Article