User Guide
Why can I only view 3 results?
You can also view all results when you are connected from the network of member institutions only. For non-member institutions, we are opening a 1-month free trial version if institution officials apply.
So many results that aren't mine?
References in many bibliographies are sometimes referred to as "Surname, I", so the citations of academics whose Surname and initials are the same may occasionally interfere. This problem is often the case with citation indexes all over the world.
How can I see only citations to my article?
After searching the name of your article, you can see the references to the article you selected as soon as you click on the details section.
 Views 7
 Downloands 2
Enhanced Blowfish Algorithm and EECC to Improve Cloud Storage Security
2023
Journal:  
International Journal of Intelligent Systems and Applications in Engineering
Author:  
Abstract:

Abstract Several applications consist of huge volume of data associated to its function. Data handling is the major concern in all application which relies in internet, Cloud is feasible solution to store such data used in internet applications but the security is a big concern and its privacy, security parameters are also degraded when these data are placed in common private storage place. Generally numerous techniques of cryptography are being involved in securing those third party storage places but still it is integrity questionable. We have proposed a method named EBF-EECC (Enhanced Blowfish Algorithm –Enhanced Elliptic Curve Cryptography) for securing data as well as key. Key is encrypted separately by EECC and Data encrypted separately with the help of EBF. In addition with these techniques we deployed one more hash function along with EBF-EECC for concrete safety of the data pertaining to individual services in the cloud. Blowfish algorithm is still being used for securing the data in excellent manner with the help of Average size of the key, Number of rounds and the sizes of block and the same proved in our simulation. Elliptic curve cryptography is also considered in proposed method by taking their strong nature of key sizes considered with other algorithms like RSA to improve concrete security measurement on cloud data.

Keywords:

Citation Owners
Information: There is no ciation to this publication.
Similar Articles










International Journal of Intelligent Systems and Applications in Engineering

Field :   Mühendislik

Journal Type :   Uluslararası

Metrics
Article : 1.632
Cite : 488
2023 Impact : 0.054
International Journal of Intelligent Systems and Applications in Engineering