Security In Cloud Computing Using Blow fish Algorithm

Authors

  • Sivasakthi Vanita Vishram Women's University, Surat, India

DOI:

https://doi.org/10.63671/ijsssr.v4i1.493

Keywords:

Cloud computing, Blow fish algorithm, DES algorithm, AES algorithm, Encryption, Decryption

Abstract

Cloud computing is a resource pool with a huge number of machines that stores massive amounts of data. Encryption techniques can be used to secure massive amounts of data in the cloud. Recent years, increase in the mobile devices and cloud processing the data stored in the cloud in the form of pictures, messages and texts. Cloud services used by the clients. For en-chancing the security in the cloud, new cyber security model is introduced with optimal key selection. Encryption is a technique used for converting data into encrypted data and securely transmitting data over public networks. The data is encrypted and stored in the cloud using blow fish encryption. To improve the accuracy and protecting confidential information from illegal access. In this paper we discussed about block-based transformation approach that combines data with the blow fish encryption algorithm. We also examined cloud computing security difficulties, applications that use this algorithm for secured data transmission, and as well as a metaphoric analysis of the blow fish security algorithm.

Downloads

Published

2026-04-23

Issue

Section

Articles

How to Cite

Security In Cloud Computing Using Blow fish Algorithm. (2026). International Journal of Science and Social Science Research, 4(1), 77-82. https://doi.org/10.63671/ijsssr.v4i1.493

Similar Articles

1-10 of 35

You may also start an advanced similarity search for this article.