Skip to main content

Improving Security Using Blow Fish Algorithm on Deduplication Cloud Storage

  • Conference paper
  • First Online:
Fundamental Research in Electrical Engineering

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 480))

Abstract

Nowadays, most of the commercial processes have been digitized. Data mostly is of great value, thus any damage or loss of it can be a great disaster for its owner. Large enterprises want to store information in a place with maximum security and low cost. One of the information-storing place is cloud that the world moving toward it. The providers of storage space are trying to improve security in the cloud. To decrypt of data in cloud storage server 64-bits secret-key block cipher called Blowfish algorithm is used. The blowfish algorithm has improved in point of security and performance comparing DES, 3DES, AES. In this paper we assume a deduplication storage server and set the blowfish. At 20 Mb block size the time of blowfish algorithm was (1.7 t) comparing with other algorithms. Also, failure time of blowfish was 60 t that it was less than DES, AES, and 3DES failure time. The results are shown with blowfish algorithm the security of storage data improved. In addition, this algorithm was implemented on the deduplication server. The Winhex output has shown all data in the encrypted format that confirmed the attacker couldn’t access to the original data.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Scholar VBR (2012) Implementation of new advance image encryption algorithm to enhance security of multimedia component. Int J Adv Technol Eng Res 2(4)

    Google Scholar 

  2. Abdul Jaleel J (2008) Guarding images using a symmetric key cryptographic technique: blowfish algorithm. JEIT 3(2) (Certified)

    Google Scholar 

  3. Garloff K (2000) Symmetric vs. asymmetric algorithms. http://users.suse.com/~garloff/Writings/mutt_gpg/node3.html. 28 Aug 2000 [Online]

  4. Hansche (2003) Cryptography, (ISC) 2 Press

    Google Scholar 

  5. Data Encryption Standard, Federal Information Processing Standard (FIPS) Publication 46, National Bureau of Standards, U.S. Department of Commerce, Washington, DC Jan 1977

    Google Scholar 

  6. W. P. a. C. D. E. F. F. Cracking DES: secrets of encryption research

    Google Scholar 

  7. Elbaz L, Bar-El H (2000) Strength assessment of encryption algorithms. website: http://www.discretix.com/PDF/Strength%20Assessment%20of%20Encryption%20Algorithms.pdf, Oct 2000

  8. Zhou L, Zhou L, Bhuyan L, Xie H Architectural analysis of cryptographic applications for network processors. Department of Computer Science & Engineering, University of California, Riverside

    Google Scholar 

  9. Stalling W (2006) Cryptography and network security, principles and practices. Retrieved on 8 Dec 2006

    Google Scholar 

  10. W Comparison of ciphers, summary of algorithms [Online]

    Google Scholar 

  11. Elbaz L, Bar-El H (2000) Strength assessment of encryption algorithms, website: http://www.discretix.com/PDF/Strength%20Assessment%20of%20Encryption%20Algorithms.pdf, Oct 2000

  12. Schneier B (1994) The blowfish encryption algorithm. Dr. Dobbs J Softw Tools 19(4):38, 40, 98, 99

    Google Scholar 

  13. Mansoor Ebrahim SKBK (2013) Symmetric algorithm survey: a comparative analysis. Int J Comput Appl

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hamed Aghili .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Aghili, H. (2019). Improving Security Using Blow Fish Algorithm on Deduplication Cloud Storage. In: Montaser Kouhsari, S. (eds) Fundamental Research in Electrical Engineering. Lecture Notes in Electrical Engineering, vol 480. Springer, Singapore. https://doi.org/10.1007/978-981-10-8672-4_54

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-8672-4_54

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-8671-7

  • Online ISBN: 978-981-10-8672-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics