ScienceQ Publishing GroupScienceQ Publishing Group
  • Home
  • Submit Manuscript
    • Open Access
  • List of Journals
  • Policies and Ethics
  • Contact Us

Secure Online Cloud Data Storage System Using Blowfish Algorithm

HomeSecure Online Cloud Data Storage System Using Blowfish Algorithm

Research Article

Secure Online Cloud Data Storage System Using Blowfish Algorithm

N.Jayapandian and A.M.J.Md. Zubair Rahman

Corresponding Author : N.Jayapandian,

Department of Computer Science & Engg, Knowledge Institute of Technology, Salem, India.

Email ID : njayapandian@gmail.com

Received : 2016-12-15 Accepted : 2017-02-02 Published : 2017-02-02

Abstract : The Government set aside several relief schemes for people, who are affecting in natural disasters like earthquakes, floods, cyclones and so on. The relief funds aided for the people those who are suffering in disaster. Initially, this endowment is helpful for surfers to get their basic necessary services. The benefits of this fund are transacted to sufferers through officers or politicians. But, these funds are not properly reached to the correct hands. Those funds are misused and corrupted by wrong persons. Because, the duplication of the government proofs like ration card, voter id, and so on are getting easily to corrupt the fund. To overcome that, we enhance some security levels for fund transaction through online using cloud computing. The three security levels of the proposed schemes are data collection, encryption and face detection. First, users must sign up or create an account in the relief fund transaction form. After that, the user should submit the details like family, bank details, documents that listed in that module. This submission is saved in cloud server, so it could be taken or seen from anywhere. Second, the submitted details are encrypted for more protection. Third, the user face must be detected using web cameras. All these levels is processed under a service level agreement (SLA); it is the contract between the cloud service provider (CSP) and the customer. The service provider must give assurance that, the above documents that the user submitted in cloud server will not be corrupted by any hackers. These three layers are called as tri-level security. The proposed design supports continued safe and efficient security measures, including uploaded proofs, encrypted data, and detect consumer face. By using our proposed system, hackers cannot get the money only the authorized person can receive the fund. So that, the rate of corruption will be low and also the funds will properly reach the sufferer people. Here we use Blowfish algorithm for encryption process, also we compare blowfish and hash chain algorithm. The proposed scheme the combination of face detection and blowfish algorithm give highest security level for cloud environments.

Keywords : Blowfish algorithm, Hash Chain algorithm, Cloud Computing, Encryption, Data Storage

Citation : N.Jayapandian et al. (2016). Secure Online Cloud Data Storage System Using Blowfish Algorithm, J. of Advancement in Engineering and Technology, V4I3.02. DOI : 10.5281/zenodo.918341

Copyright : © 2017 N.Jayapandian. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.

Journal of Advancement in Engineering and Technology

ISSN : 2348-2931

Volume 4 / Issue 3

ScienceQ Publishing Group

Download Article

Reviewer Comments : Reviewers comments section of this article will get update shortly.

January 16, 2018
admin
Issue 3, JAET, Volume 4
No Comments
Submit Online
Article Structuring Guideline
Instruction for Author pdf
Policies and Ethics

 

pdf Copyright Form docx

Archives
  • JABZ
    • Volume 1
      • Issue 1
      • Issue 2
      • Issue 3
      • Issue 4
    • Volume 2
      • Issue 1
      • Issue 2
      • Issue 3
      • Issue 4
    • volume 3
      • Issue 1
      • Issue 2
      • Issue 3
      • Issue 4
    • Volume 4
      • Issue 1
      • Issue 2
      • Issue 3
      • Issue 4
    • volume 5
      • Issue 1
      • Issue 2
      • Issue 3
      • Issue 4
    • volume 6
      • Issue 1
      • Issue 2
      • Issue 3
      • Issue 4
    • Volume 7
      • Issue 1
      • Issue 2
      • Issue 3
      • Issue 4
    • Volume 8
      • Issue 1
  • JAET
    • Volume 1
      • Issue 1
      • Issue-2
      • Issue-3
      • Issue-4
    • Volume 2
      • Issue 1
      • Issue 2
      • Issue 3
      • Issue 4
    • Volume 3
      • Issue 1
      • Issue 2
      • Issue 3
      • Issue 4
    • Volume 4
      • Issue 1
      • Issue 2
      • Issue 3
      • Issue 4
    • Volume 5
      • Issue 1
      • Issue 2
      • Issue 3
      • Issue 4
    • volume 6
      • Issue 1
      • Issue 2
      • Issue 3
      • Issue 4
    • Volume 7
      • Issue 1
      • Issue 2
      • Issue 3
      • Issue 4
    • Volume 8
      • Issue 1
  • JALS
    • Volume 1
      • Issue 1
      • Issue 2
      • Issue 3
      • Issue 4
    • Volume 2
      • Issue 1
      • Issue 2
      • Issue 3
      • Issue 4
    • Volume 3
      • Issue 1
      • Issue 2
      • Issue 3
      • Issue 4
    • Volume 4
      • Issue 1
      • Issue 2
      • Issue 3
      • Issue 4
    • Volume 5
      • Issue 1
      • Issue 2
      • Issue 3
      • Issue 4
    • Volume 6
      • Issue 1
      • Issue 2
      • Issue 3
      • Issue 4
    • Volume 7
      • Issue 1
      • Issue 2
      • Issue 3
      • Issue 4
    • Volume 8
      • Issue 1
  • JBCE
    • Volume 1
      • Issue 1
      • Issue 2
      • Issue 3
      • Issue 4
    • Volume 2
      • Issue 1
      • Issue 2
      • Issue 3
      • Issue 4
    • Volume 3
      • Issue 1
      • Issue 2
      • Issue 3
      • Issue 4
  • JCLS
    • Volume 1
      • Issue 1
      • Issue 2
      • Issue 3
    • Volume 2
      • Issue 1
      • Issue 3
    • Volume 3
      • Issue 2
      • Issue 3
      • Issue 4
  • JMDDR
    • Volume 1
      • Issue 1
      • Issue 2
      • Issue 3
      • Issue 4
    • Volume 2
      • Issue 1
      • Issue 2
      • Issue 3
      • Issue 4
    • Volume 3
      • Issue 1
      • Issue 2
      • Issue 3
      • Issue 4
    • Volume 4
      • Issue 1
      • Issue 2
      • Issue 3
      • Issue 4
    • Volume 5
      • Issue 1
      • Issue 2
  • JPCS
    • Volume 1
      • Issue 1
      • Issue 2
      • Issue 3
      • Issue 4
    • Volume 2
      • Issue 1
      • Issue 2
      • Issue 3
      • Issue 4
    • Volume 3
      • Issue 1
      • Issue 2
      • Issue 3
      • Issue 4
    • Volume 4
      • Issue 1
      • Issue 2
      • Issue 3
      • Issue 4
    • Volume 5
      • Issue 1
      • Issue 2
      • Issue 3
      • Issue 4
    • Volume 6
      • Issue 1
      • Issue 2
      • Issue 3
      • Issue 4
    • Volume 7
      • Issue 1
      • Issue 2
      • Issue 3
  • Home
  • Submit Manuscript
  • List of Journals
  • Policies and Ethics
  • Contact Us
© ScienceQ Publishing Group 2023. All Rights Reserved.
SciencQ Publishing Group
Show Buttons
Hide Buttons
  • Home
  • Submit Manuscript
    • Open Access
  • List of Journals
  • Policies and Ethics
  • Contact Us