Abstract

Services in the cloud environment are distributed between all servers and users. Cloud providers have problems with file protection as security is a major problem when processing and transferring information, as the original data type can be viewed, misused and lost. In the cloud computing world, cloud protection is a major concern. A variety of research projects are planned to safeguard the cloud climate. Cryptography is used to address the security problem and to achieve the CIA (confidentiality, honesty and disponibility). The most effective technique for ensuring high data transfer and storage protection is cryptography. There are certain drawbacks in traditional symmetric and asymmetrics. We will introduce a new technique of hybrid data protection and confidentiality to solve this issue. We use the ECC and Blowfish to build a hybrid algorithm in this article. The hybrid scheme output is compared to the current hybrid technique and demonstrates the high safety and confidentiality of the patient data in the proposed method. The hybrid encryption is used to remove both symmetrical and asymmetrical drawbacks.

Highlights

  • Cryphotography, i.e. correspondence, overcome the involvement or control of the opponents or third parties, e.g.avoid information leakage to unauthorized parties, is the method of constructing and analyzing protocols for safe exchanging of information[1]

  • We describe the fundamental functions of cryptography algorithms in Elliptic curve and Blowfish

  • The established reputations of the elliptical curve cryptography (ECC) are focused on its discreet logarithm algorithmic problem (DLP)

Read more

Summary

Introduction

Cryphotography, i.e. correspondence, overcome the involvement or control of the opponents or third parties, e.g. Cript algorithms are built around assumptions of computational hardness, e.g. with numerological definition, which makes it impossible for an unauthorized party to crack such algorithms in practice. These algorithms/schemes are called computer-proof, since in principle, while they are breakable, they cannot be broken by known functional means. The algorithms used for that method are called cryptographic algorithms or ciphers, which can be classified into the two basic kinds based on the keys used as a symmetric key and asymmetrical key algorithm (altering data from readable type to safe shape). Sender and recipient share the key, which is a big problem, as an attacker can scan the important conversation channel to decrypt the data[4]. Any public body can send a message with a public key, but it keeps a private key secret and can decode the message [5]

Literature Survey
Privacy and Security Requirements of Data Sharing in the Cloud
Proposed Method
Elliptic Curve Cryptographic Algorithm
Blowfish Algorithm
System Model
Download Function
Result and Analysis
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call