Impact Factor (2025): 6.9
DOI Prefix: 10.47001/IRJIET
Vol 7 No 5 (2023): Volume 7, Issue 5, May 2023 | Pages: 351-356
International Research Journal of Innovations in Engineering and Technology
OPEN ACCESS | Research Article | Published Date: 12-06-2023
This proposed hybrid algorithm can be made much more powerful and secure by increasing the number of iterations in the encryption algorithm to suit the level of security required. An inverse policy of reducing the number of iterations for lower security can also be employed. Blowfish used for the encryption of file slices takes minimum time and has maximum throughput for encryption and decryption from other symmetric algorithms. The idea of splitting and merging adds on to meet the principle of data security. This system can be implemented into banking and corporate sectors to securely transfer confidential data in the world of data being the key asset, safeguarding our asset are primary responsibility. Communications, databases, infrastructure, transactions, knowledge; an organization’s data is arguably its most valuable asset. It is in a business’ best interests to keep its information safe, regardless of legal or regulatory requirements. For data security and privacy protection issues, the fundamental challenge of separation of sensitive data and access control is fulfilled. Cryptography technique translates original data into unreadable form. Cryptography technique is divided into symmetric key cryptography and public key cryptography. This technique uses keys for translate data into unreadable form. So only authorized person can access data from cloud server. Cipher text data is visible for all people.
AES, Advanced Encryption, Standard, DES, Data Encryption Standard, IDEA, International Data Encryption Algorithm, RC6, Rivest cipher 6, ECC, Elliptic Curve Cryptography
Shruti Kambali, Ghanshyam Gadekar, Poorva Padave, Poorva Patil, Prof. Swati Vyas, “Secure Cloud Storage Using Hybrid Cryptography” Published in International Research Journal of Innovations in Engineering and Technology - IRJIET, Volume 7, Issue 5, pp 351-356, May 2023. https://doi.org/10.47001/IRJIET/2023.705052
This work is licensed under Creative common Attribution Non Commercial 4.0 Internation Licence