Security In Cloud Computing Using Blow fish Algorithm
DOI:
https://doi.org/10.63671/ijsssr.v4i1.493Keywords:
Cloud computing, Blow fish algorithm, DES algorithm, AES algorithm, Encryption, DecryptionAbstract
Cloud computing is a resource pool with a huge number of machines that stores massive amounts of data. Encryption techniques can be used to secure massive amounts of data in the cloud. Recent years, increase in the mobile devices and cloud processing the data stored in the cloud in the form of pictures, messages and texts. Cloud services used by the clients. For en-chancing the security in the cloud, new cyber security model is introduced with optimal key selection. Encryption is a technique used for converting data into encrypted data and securely transmitting data over public networks. The data is encrypted and stored in the cloud using blow fish encryption. To improve the accuracy and protecting confidential information from illegal access. In this paper we discussed about block-based transformation approach that combines data with the blow fish encryption algorithm. We also examined cloud computing security difficulties, applications that use this algorithm for secured data transmission, and as well as a metaphoric analysis of the blow fish security algorithm.
Downloads
Published
Issue
Section
License
Copyright (c) 2026 International Journal of Science and Social Science Research

This work is licensed under a Creative Commons Attribution 4.0 International License.
