Abstract
Nowadays, most of the commercial processes have been digitized. Data mostly is of great value, thus any damage or loss of it can be a great disaster for its owner. Large enterprises want to store information in a place with maximum security and low cost. One of the information-storing place is cloud that the world moving toward it. The providers of storage space are trying to improve security in the cloud. To decrypt of data in cloud storage server 64-bits secret-key block cipher called Blowfish algorithm is used. The blowfish algorithm has improved in point of security and performance comparing DES, 3DES, AES. In this paper we assume a deduplication storage server and set the blowfish. At 20 Mb block size the time of blowfish algorithm was (1.7 t) comparing with other algorithms. Also, failure time of blowfish was 60 t that it was less than DES, AES, and 3DES failure time. The results are shown with blowfish algorithm the security of storage data improved. In addition, this algorithm was implemented on the deduplication server. The Winhex output has shown all data in the encrypted format that confirmed the attacker couldn’t access to the original data.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Scholar VBR (2012) Implementation of new advance image encryption algorithm to enhance security of multimedia component. Int J Adv Technol Eng Res 2(4)
Abdul Jaleel J (2008) Guarding images using a symmetric key cryptographic technique: blowfish algorithm. JEIT 3(2) (Certified)
Garloff K (2000) Symmetric vs. asymmetric algorithms. http://users.suse.com/~garloff/Writings/mutt_gpg/node3.html. 28 Aug 2000 [Online]
Hansche (2003) Cryptography, (ISC) 2 Press
Data Encryption Standard, Federal Information Processing Standard (FIPS) Publication 46, National Bureau of Standards, U.S. Department of Commerce, Washington, DC Jan 1977
W. P. a. C. D. E. F. F. Cracking DES: secrets of encryption research
Elbaz L, Bar-El H (2000) Strength assessment of encryption algorithms. website: http://www.discretix.com/PDF/Strength%20Assessment%20of%20Encryption%20Algorithms.pdf, Oct 2000
Zhou L, Zhou L, Bhuyan L, Xie H Architectural analysis of cryptographic applications for network processors. Department of Computer Science & Engineering, University of California, Riverside
Stalling W (2006) Cryptography and network security, principles and practices. Retrieved on 8 Dec 2006
W Comparison of ciphers, summary of algorithms [Online]
Elbaz L, Bar-El H (2000) Strength assessment of encryption algorithms, website: http://www.discretix.com/PDF/Strength%20Assessment%20of%20Encryption%20Algorithms.pdf, Oct 2000
Schneier B (1994) The blowfish encryption algorithm. Dr. Dobbs J Softw Tools 19(4):38, 40, 98, 99
Mansoor Ebrahim SKBK (2013) Symmetric algorithm survey: a comparative analysis. Int J Comput Appl
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Aghili, H. (2019). Improving Security Using Blow Fish Algorithm on Deduplication Cloud Storage. In: Montaser Kouhsari, S. (eds) Fundamental Research in Electrical Engineering. Lecture Notes in Electrical Engineering, vol 480. Springer, Singapore. https://doi.org/10.1007/978-981-10-8672-4_54
Download citation
DOI: https://doi.org/10.1007/978-981-10-8672-4_54
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-8671-7
Online ISBN: 978-981-10-8672-4
eBook Packages: EngineeringEngineering (R0)