SlideShare a Scribd company logo
IJSRD - International Journal for Scientific Research & Development| Vol. 2, Issue 09, 2014 | ISSN (online): 2321-0613
All rights reserved by www.ijsrd.com 523
Data Security in Cloud using Blowfish Algorithm
Govinda.K1 Mythili D2 Geetha Priya S3
1,2,3
Department of Computer Science Engineering
1,2,3
SCSE, VIT University, Vellore, India
Abstract— Cloud computing is computing in which large
groups of remote servers are networked to allow centralized
data storage and online access to computer services or
resources. The strives of environment is dynamic,
customizable and reliable with the quality of services.
Security issues in the cloud as it is anywhere else. Lots of
people share different point of views in cloud computing.
Some of the people believe that it is unsafe to use Cloud
Computing .Clouds can be classified as public, private or
hybrid. This paper handle security issue in cloud using
blowfish algorithm.
Key words: Security, Data, Cloud, OPEX, CAPEX
I. INTRODUCTION
Cloud computing relies on restricting sharing of resources to
achieve coherence and economies of scale, similar to a
utility (like the electricity grid) over a network. At the
foundation of cloud computing is the broader concept of
converged infrastructure and shared services.
Cloud computing, or in simpler shorthand just "the
cloud", also focuses on maximizing the effectiveness of the
shared resources. Cloud resources are usually not only
shared by multiple users but are also dynamically
reallocated per demand. This can work for allocating
resources to users. For example, a cloud computer facility
that serves European users during European business hours
with a specific application (e.g., email) may reallocate the
same resources to serve North American users during North
America's business hours with a different application (e.g., a
web server). This approach should maximize the use of
computing power thus reducing environmental damage as
well since less power, air conditioning, Rackspace, etc. are
required for a variety of functions. With cloud computing,
multiple users can access a single server to retrieve and
update their data without purchasing licenses for different
applications.
The term "moving to cloud" also refers to an
organization moving away from a traditional CAPEX model
(buy the dedicated hardware and depreciate it over a period
of time) to the OPEX model (use a shared cloud
infrastructure and pay as one uses it).
Proponents claim that cloud computing allows
companies to avoid upfront infrastructure costs, and focus
on projects that differentiate their businesses instead of on
infrastructure. Proponents also claim that cloud computing
allows enterprises to get their applications up and running
faster, with improved manageability and less maintenance,
and enables IT to more rapidly adjust resources to meet
fluctuating and unpredictable business demand. Cloud
providers typically use a "pay as you go" model. This can
lead to unexpectedly high charges if administrators do not
adapt to the cloud pricing model.
The present availability of high-capacity networks,
low-cost computers and storage devices as well as the
widespread adoption of hardware virtualization, service-
oriented architecture, and autonomic and utility computing
have led to a growth in cloud computing. Cloud vendors are
experiencing growth rates of 50% per annum.
II. LITERATURE REVIEW
Security and privacy are the two major concerns about
cloud computing. In the cloud computing world, the virtual
environment lets user access computing power that exceeds
that contained within their physical world. To enter this
virtual environment a user is required to transfer data
throughout the cloud. Consequently several security
concerns arises [4] [7] [8] [16]
A. Information Security
1) Losing Control over Data:
Outsourcing means losing significant control over data.
Large banks don’t want to run a program delivered in the
cloud that risk compromising their data through interaction
with some other program. Amazon Simple Storage Service
(S3) APIs provide both bucket- and object level access
controls, with defaults that only permit authenticated access
by the bucket and/or object creator. Unless a customer
grants anonymous access to their data, the first step before a
user can access data is to be authenticated using HMAC-
SHA1 signature of the request using the user’s private key.
Therefore, the customer maintains full control over who has
access to their data.
2) Data Integrity:
Data integrity is assurance that data changes only in
response to authorized transactions. For example, if the
client is responsible for constructing and validating database
queries and the server executes them blindly, the intruder
will always be able to modify the client-side code to do
whatever he has permission to do with the backend
database. Usually, that means the intruder can read, change,
or delete data. The common standard to ensure data integrity
does not yet exists [8]. In this new world of computing users
are universally required to accept the underlying premise of
trust. In fact, some have conjectured that trust is the biggest
concern facing cloud computing.
3) Risk of Seizure:
In a public cloud, you are sharing computing resources with
other companies.. Exposing your data in an environment
shared with other companies could give the government
“reasonable cause” to seize your assets because another
company has violated the law. Simply because you share the
environment in the cloud, may put data at risk of seizure.
The only protection against the risk of seizure for user is to
encrypt their data. The subpoena will compel the cloud
provider to turn over user’s data and any access it might
have to that data, but cloud provider won’t have user’s
access or decryption keys. To get at the data, the court will
have to come to user and subpoena user. As a result, user
will end up with the same level of control user have in his
private data center.
4) Incompatibility Issue:
Storage services provided by one cloud vendor may be
incompatible with another vendor’s services should you
Data Security in Cloud using Blowfish Algorithm
(IJSRD/Vol. 2/Issue 09/2014/117)
All rights reserved by www.ijsrd.com 524
decide to move from one to the other. Vendors are known
for creating what the hosting world calls “sticky services” –
services that an end user may have difficulty transporting
from one cloud vendor to another.
5) Failure in Provider’s Security:
Failure of cloud provider to properly secure portions of its
infrastructure – especially in the maintenance of physical
access control – results in the compromise of subscriber
systems. Cloud can comprise multiple entities, and in such a
configuration, no cloud can be more secure than its weakest
link. It is expected that customer must trust provider’s
security. For small and medium size businesses provider
security may exceed customer security. It is generally
difficult for the details that help ensure that the right things
are being done.
6) Cloud Provider Goes Down:
This scenario has a number of variants: bankruptcy,
deciding to take the business in another direction, or a
widespread and extended outage. Whatever is going on,
subscriber risk losing access to their production system due
to the actions of another company Subscriber also risk that
the organization controlling subscriber data might not
protect it in accordance with the service levels to which they
may have been previously committed. The only option user
have is to choose a second provider and use automated,
regular backups, for which many open source and
commercial solutions exist, to make sure any current and
historical data can be recovered even if user cloud provider
were to disappear from the face of the earth.
III. PROPOSED METHOD
Blowfish is an encryption algorithm that can be used as a
replacement for the DES or IDEA algorithms. It is a
symmetric (that is, a secret or private key) block cipher that
uses a variable-length key, from 32 bits to 448 bits, making
it useful for both domestic and exportable use. (The U. S.
government forbids the exportation of encryption software
using keys larger than 40 bits except in special cases.
Blowfish was designed in 1993 by Bruce Schneider as an
alternative to existing encryption algorithms. Designed with
32-bit instruction processors in mind, it is significantly
faster than DES. Since its origin, it has been analyzed
considerably. Blowfish is unpatented, license-free, and
available free for all uses.
Fig. 1: Block diagram of Blowfish
Encrypt the all zero string using the Blowfish
algorithm, using the modified P-array above, to get a 64 bit
block. Replace P1 with the first 32 bits of output, and P2
with the second 32 bits of output (from the 64 bit block).
Use the 64 bit output as input back into the Blowfish cipher,
to get a new 64 bit block. Replace the next values in the P-
array with the block. Repeat for all the values in the P-array
and all the S boxes in order.
(The second 64 bit block is dropped into the P-array)
The Blowfish algorithm is now ready for encryption. The
encryption is a simply Feistal network of 16 rounds. For the
input of 64 bits, do:
Divide x into two 32-bit halves: xL, xR
For i = 1 to 16:
xL = xL XOR Pi
xR = F(xL) XOR xR
Swap xL and xR
Next i
Swap xL and xR (Undo the last swap.)
xR = xR XOR P17
xL = xL XOR P18
Recombine xL and xR
The F function is: F(xL) = ((S1,a + S2,b mod 232) XOR
S3,c) + S4,d mod 232 where a,b,c,d are four 8 bit quartered
derived from xL.
Decryption is the same as encryption, except the P-arrays
are used in reverse.
Output
Some example input and output of the Blowfish algorithm.
$ ./Blowfish 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00
Key: 0 0 0 0 0 0 0 0
Plaintext: 0 0 0 0 0 0 0 0
IV. CONCLUSION
The phenomenon in cloud computing shows a interest
through worldwide because of its lower ownership,
scalability, competitive differentiation, reduced complexity
for customers, and faster and easier services.cloud offers
several advantages, people can see cloud computing from
different points of view. Some people think that cloud is
unsafe. But few people find it safer for provisioning,
especially small businesses. Several large organizations and
some government agencies are still holding back. They
indicate that they will not consider soon because they have
no good way to quantify their risks. To gain total acceptance
from all potential users cloud computing require some
standardization in the security. In this paper we
implemented security in cloud using blowfish as a future
work some other technique can be used.
REFERENCE
[1] http://csrc.nist.gov/groups/SNS/cloud-
computing/index.html,
[2] Cisco White Paper,
[3] http://www.cisco.com/en/US/solutions/collateral/ns
341/ns525/ns537/white_paper_c11-532553.html,
published 2009, pp.1-6.
[4] John Viega, McAffee, Cloud Computing and the
Common Man,” published on the IEEE Journal ON
Cloud Computing Security, pp. 106-108, August
2009.
[5] George Reese, “Cloud Application Architectures”,
First edition, O’Reilly Media, April 2009, ISBN
9780596156367, pp. 2-4, 99-118.
Data Security in Cloud using Blowfish Algorithm
(IJSRD/Vol. 2/Issue 09/2014/117)
All rights reserved by www.ijsrd.com 525
[6] http://en.wikipedia.org/wiki/Cloud_computing.
[7] http://communication.howstuffworks.com/cloud
computing1.htm.
[8] John Harauz, Lori M. Kaufman, Bruce Potter,
“Data Security in the World of Cloud Computing,”
published on the IEEE Journal on Cloud
Computing Security, July/August 2009, Vol. 7,
No.4, pp. 61-64.
[9] John W. Rittinghouse, James F. Ransome, “Cloud
Computing Implementation, Management, and
Security”, CRC Press, August 17, 2009, ISBN
9781439806807, pp. 147-158, 183-212.
[10]Amazon White Paper,
http://aws.amazon.com/about-aws/whats-
new/2009/06/08/new-aws-security-center-and-
security-whitepaper/, published June 2009.
[11]Marco Descher, Philip Masser, Thomas Feilhauer,
A Min Tjoa, David Huemer, “ Retaining Data
Control to the Client Infrastructure Clouds”,
published on the IEEE, 2009 International
Conference on Availability, Reliability and
Security, pp. 9-15.
[12]David Bernstein, Erik Ludvigson, Krishna Sankar,
Steve Diamond, Monique Morrow, “Blueprint for
the Intercloud – Protocols and Formats for Cloud
Computing Interoperability, submitted to IEEE,
2009 Fourth International Conference on Internet
and Web Applications and Services, pp. 328-335.
[13]Liang-Jie Zhang, Qun Zhou, “CCOA: Cloud
Computing Open Architecture”, published on
IEEE, 2009 IEEE International Conference on Web
Services, pp. 607-615.
[14]Amazon White Paper, “Introduction to Amazon
Virtual Private Cloud”, Available:
http://aws.amazon.com/about-aws/whats-
new/2009/08/26/introducing-amazon-virtual-
private-cloud/, published Aug 26, 2009, pp. 6-8.
[15]Rajkumar Buyya, Chee Shin Yeo,
SrikumarVenugopal, “Market-Oriented Cloud
Computing: Vision, Hype, and Reality for
Delivering IT Services as Computing Utilities”,
grid Computing and Distributed Systems and
Software Engineering, The University of
Melbourne, Australia.
[16]Jinesh Varia, Amazon Web Services, “Building
GrepTheWeb in the Cloud, Part 1: Cloud
Architectures”, Available:
http://developer.amazonwebservices.com/connect,
July 2008, pp. 1-7 Jon Brodkin, “Gartner: Seven
Cloud Computing Security Risks”, Available:
http://www.infoworld.com, published July 2008,
pp. 1-3.

More Related Content

PDF
An Auditing Protocol for Protected Data Storage in Cloud Computing
PDF
E041212224
PDF
L018137479
PDF
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
PDF
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
PDF
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
PDF
DATA PROVENENCE IN PUBLIC CLOUD
PDF
Secure Data Sharing In an Untrusted Cloud
An Auditing Protocol for Protected Data Storage in Cloud Computing
E041212224
L018137479
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
DATA PROVENENCE IN PUBLIC CLOUD
Secure Data Sharing In an Untrusted Cloud

What's hot (18)

PDF
International Journal of Engineering and Science Invention (IJESI)
PDF
A Hybrid Cloud Approach for Secure Authorized Deduplication
PDF
A hybrid cloud approach for secure authorized deduplication
PDF
Encryption based multi user manner secured data sharing and storing in cloud
PDF
International Journal of Computational Engineering Research(IJCER)
PDF
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
PDF
an enhanced multi layered cryptosystem based secure
PDF
H1803035056
PDF
F01113945
PDF
Secure data sharing in cloud computing using revocable storage identity-based...
PDF
Two Level Auditing Architecture to Maintain Consistent In Cloud
PDF
Improving Data Storage Security in Cloud using Hadoop
PDF
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
PDF
International Journal of Computational Engineering Research(IJCER)
PDF
G017424448
PDF
Ijariie1196
PDF
Improving Efficiency of Security in Multi-Cloud
PDF
J0423066069
International Journal of Engineering and Science Invention (IJESI)
A Hybrid Cloud Approach for Secure Authorized Deduplication
A hybrid cloud approach for secure authorized deduplication
Encryption based multi user manner secured data sharing and storing in cloud
International Journal of Computational Engineering Research(IJCER)
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
an enhanced multi layered cryptosystem based secure
H1803035056
F01113945
Secure data sharing in cloud computing using revocable storage identity-based...
Two Level Auditing Architecture to Maintain Consistent In Cloud
Improving Data Storage Security in Cloud using Hadoop
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
International Journal of Computational Engineering Research(IJCER)
G017424448
Ijariie1196
Improving Efficiency of Security in Multi-Cloud
J0423066069
Ad

Similar to DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHM (20)

DOCX
Fog doc
DOCX
fog computing provide security to the data in cloud
PDF
Aes based secured framework for cloud databases
DOCX
Fog computing document
PDF
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
PDF
Cloud Computing Using Encryption and Intrusion Detection
PDF
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
PDF
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
PDF
A Survey of the Homomorphic Encryption Approach for Data Security in Cloud Co...
PDF
Encryption Technique for a Trusted Cloud Computing Environment
PDF
H017155360
PDF
Encryption Technique for a Trusted Cloud Computing Environment
PDF
Encryption Technique for a Trusted Cloud Computing Environment
PDF
An efficient and secure data storage in cloud computing using modified RSA pu...
PDF
Security for Effective Data Storage in Multi Clouds
PDF
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
PDF
R180203114117
PDF
G033030035
PDF
A survey on data security in cloud computing issues and mitigation techniques
PDF
I017225966
Fog doc
fog computing provide security to the data in cloud
Aes based secured framework for cloud databases
Fog computing document
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
Cloud Computing Using Encryption and Intrusion Detection
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
A Survey of the Homomorphic Encryption Approach for Data Security in Cloud Co...
Encryption Technique for a Trusted Cloud Computing Environment
H017155360
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
An efficient and secure data storage in cloud computing using modified RSA pu...
Security for Effective Data Storage in Multi Clouds
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
R180203114117
G033030035
A survey on data security in cloud computing issues and mitigation techniques
I017225966
Ad

More from ijsrd.com (20)

PDF
IoT Enabled Smart Grid
PDF
A Survey Report on : Security & Challenges in Internet of Things
PDF
IoT for Everyday Life
PDF
Study on Issues in Managing and Protecting Data of IOT
PDF
Interactive Technologies for Improving Quality of Education to Build Collabor...
PDF
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
PDF
A Study of the Adverse Effects of IoT on Student's Life
PDF
Pedagogy for Effective use of ICT in English Language Learning
PDF
Virtual Eye - Smart Traffic Navigation System
PDF
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
PDF
Understanding IoT Management for Smart Refrigerator
PDF
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
PDF
A Review: Microwave Energy for materials processing
PDF
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
PDF
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
PDF
Making model of dual axis solar tracking with Maximum Power Point Tracking
PDF
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
PDF
Study and Review on Various Current Comparators
PDF
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
PDF
Defending Reactive Jammers in WSN using a Trigger Identification Service.
IoT Enabled Smart Grid
A Survey Report on : Security & Challenges in Internet of Things
IoT for Everyday Life
Study on Issues in Managing and Protecting Data of IOT
Interactive Technologies for Improving Quality of Education to Build Collabor...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
A Study of the Adverse Effects of IoT on Student's Life
Pedagogy for Effective use of ICT in English Language Learning
Virtual Eye - Smart Traffic Navigation System
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Understanding IoT Management for Smart Refrigerator
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
A Review: Microwave Energy for materials processing
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
Making model of dual axis solar tracking with Maximum Power Point Tracking
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
Study and Review on Various Current Comparators
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Defending Reactive Jammers in WSN using a Trigger Identification Service.

Recently uploaded (20)

PPTX
PPH.pptx obstetrics and gynecology in nursing
PPTX
Week 4 Term 3 Study Techniques revisited.pptx
PDF
Pre independence Education in Inndia.pdf
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
Basic Mud Logging Guide for educational purpose
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PPTX
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
RMMM.pdf make it easy to upload and study
PDF
TR - Agricultural Crops Production NC III.pdf
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
Business Ethics Teaching Materials for college
PPH.pptx obstetrics and gynecology in nursing
Week 4 Term 3 Study Techniques revisited.pptx
Pre independence Education in Inndia.pdf
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
Final Presentation General Medicine 03-08-2024.pptx
102 student loan defaulters named and shamed – Is someone you know on the list?
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
human mycosis Human fungal infections are called human mycosis..pptx
Basic Mud Logging Guide for educational purpose
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
STATICS OF THE RIGID BODIES Hibbelers.pdf
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
Module 4: Burden of Disease Tutorial Slides S2 2025
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
RMMM.pdf make it easy to upload and study
TR - Agricultural Crops Production NC III.pdf
Microbial diseases, their pathogenesis and prophylaxis
2.FourierTransform-ShortQuestionswithAnswers.pdf
Business Ethics Teaching Materials for college

DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHM

  • 1. IJSRD - International Journal for Scientific Research & Development| Vol. 2, Issue 09, 2014 | ISSN (online): 2321-0613 All rights reserved by www.ijsrd.com 523 Data Security in Cloud using Blowfish Algorithm Govinda.K1 Mythili D2 Geetha Priya S3 1,2,3 Department of Computer Science Engineering 1,2,3 SCSE, VIT University, Vellore, India Abstract— Cloud computing is computing in which large groups of remote servers are networked to allow centralized data storage and online access to computer services or resources. The strives of environment is dynamic, customizable and reliable with the quality of services. Security issues in the cloud as it is anywhere else. Lots of people share different point of views in cloud computing. Some of the people believe that it is unsafe to use Cloud Computing .Clouds can be classified as public, private or hybrid. This paper handle security issue in cloud using blowfish algorithm. Key words: Security, Data, Cloud, OPEX, CAPEX I. INTRODUCTION Cloud computing relies on restricting sharing of resources to achieve coherence and economies of scale, similar to a utility (like the electricity grid) over a network. At the foundation of cloud computing is the broader concept of converged infrastructure and shared services. Cloud computing, or in simpler shorthand just "the cloud", also focuses on maximizing the effectiveness of the shared resources. Cloud resources are usually not only shared by multiple users but are also dynamically reallocated per demand. This can work for allocating resources to users. For example, a cloud computer facility that serves European users during European business hours with a specific application (e.g., email) may reallocate the same resources to serve North American users during North America's business hours with a different application (e.g., a web server). This approach should maximize the use of computing power thus reducing environmental damage as well since less power, air conditioning, Rackspace, etc. are required for a variety of functions. With cloud computing, multiple users can access a single server to retrieve and update their data without purchasing licenses for different applications. The term "moving to cloud" also refers to an organization moving away from a traditional CAPEX model (buy the dedicated hardware and depreciate it over a period of time) to the OPEX model (use a shared cloud infrastructure and pay as one uses it). Proponents claim that cloud computing allows companies to avoid upfront infrastructure costs, and focus on projects that differentiate their businesses instead of on infrastructure. Proponents also claim that cloud computing allows enterprises to get their applications up and running faster, with improved manageability and less maintenance, and enables IT to more rapidly adjust resources to meet fluctuating and unpredictable business demand. Cloud providers typically use a "pay as you go" model. This can lead to unexpectedly high charges if administrators do not adapt to the cloud pricing model. The present availability of high-capacity networks, low-cost computers and storage devices as well as the widespread adoption of hardware virtualization, service- oriented architecture, and autonomic and utility computing have led to a growth in cloud computing. Cloud vendors are experiencing growth rates of 50% per annum. II. LITERATURE REVIEW Security and privacy are the two major concerns about cloud computing. In the cloud computing world, the virtual environment lets user access computing power that exceeds that contained within their physical world. To enter this virtual environment a user is required to transfer data throughout the cloud. Consequently several security concerns arises [4] [7] [8] [16] A. Information Security 1) Losing Control over Data: Outsourcing means losing significant control over data. Large banks don’t want to run a program delivered in the cloud that risk compromising their data through interaction with some other program. Amazon Simple Storage Service (S3) APIs provide both bucket- and object level access controls, with defaults that only permit authenticated access by the bucket and/or object creator. Unless a customer grants anonymous access to their data, the first step before a user can access data is to be authenticated using HMAC- SHA1 signature of the request using the user’s private key. Therefore, the customer maintains full control over who has access to their data. 2) Data Integrity: Data integrity is assurance that data changes only in response to authorized transactions. For example, if the client is responsible for constructing and validating database queries and the server executes them blindly, the intruder will always be able to modify the client-side code to do whatever he has permission to do with the backend database. Usually, that means the intruder can read, change, or delete data. The common standard to ensure data integrity does not yet exists [8]. In this new world of computing users are universally required to accept the underlying premise of trust. In fact, some have conjectured that trust is the biggest concern facing cloud computing. 3) Risk of Seizure: In a public cloud, you are sharing computing resources with other companies.. Exposing your data in an environment shared with other companies could give the government “reasonable cause” to seize your assets because another company has violated the law. Simply because you share the environment in the cloud, may put data at risk of seizure. The only protection against the risk of seizure for user is to encrypt their data. The subpoena will compel the cloud provider to turn over user’s data and any access it might have to that data, but cloud provider won’t have user’s access or decryption keys. To get at the data, the court will have to come to user and subpoena user. As a result, user will end up with the same level of control user have in his private data center. 4) Incompatibility Issue: Storage services provided by one cloud vendor may be incompatible with another vendor’s services should you
  • 2. Data Security in Cloud using Blowfish Algorithm (IJSRD/Vol. 2/Issue 09/2014/117) All rights reserved by www.ijsrd.com 524 decide to move from one to the other. Vendors are known for creating what the hosting world calls “sticky services” – services that an end user may have difficulty transporting from one cloud vendor to another. 5) Failure in Provider’s Security: Failure of cloud provider to properly secure portions of its infrastructure – especially in the maintenance of physical access control – results in the compromise of subscriber systems. Cloud can comprise multiple entities, and in such a configuration, no cloud can be more secure than its weakest link. It is expected that customer must trust provider’s security. For small and medium size businesses provider security may exceed customer security. It is generally difficult for the details that help ensure that the right things are being done. 6) Cloud Provider Goes Down: This scenario has a number of variants: bankruptcy, deciding to take the business in another direction, or a widespread and extended outage. Whatever is going on, subscriber risk losing access to their production system due to the actions of another company Subscriber also risk that the organization controlling subscriber data might not protect it in accordance with the service levels to which they may have been previously committed. The only option user have is to choose a second provider and use automated, regular backups, for which many open source and commercial solutions exist, to make sure any current and historical data can be recovered even if user cloud provider were to disappear from the face of the earth. III. PROPOSED METHOD Blowfish is an encryption algorithm that can be used as a replacement for the DES or IDEA algorithms. It is a symmetric (that is, a secret or private key) block cipher that uses a variable-length key, from 32 bits to 448 bits, making it useful for both domestic and exportable use. (The U. S. government forbids the exportation of encryption software using keys larger than 40 bits except in special cases. Blowfish was designed in 1993 by Bruce Schneider as an alternative to existing encryption algorithms. Designed with 32-bit instruction processors in mind, it is significantly faster than DES. Since its origin, it has been analyzed considerably. Blowfish is unpatented, license-free, and available free for all uses. Fig. 1: Block diagram of Blowfish Encrypt the all zero string using the Blowfish algorithm, using the modified P-array above, to get a 64 bit block. Replace P1 with the first 32 bits of output, and P2 with the second 32 bits of output (from the 64 bit block). Use the 64 bit output as input back into the Blowfish cipher, to get a new 64 bit block. Replace the next values in the P- array with the block. Repeat for all the values in the P-array and all the S boxes in order. (The second 64 bit block is dropped into the P-array) The Blowfish algorithm is now ready for encryption. The encryption is a simply Feistal network of 16 rounds. For the input of 64 bits, do: Divide x into two 32-bit halves: xL, xR For i = 1 to 16: xL = xL XOR Pi xR = F(xL) XOR xR Swap xL and xR Next i Swap xL and xR (Undo the last swap.) xR = xR XOR P17 xL = xL XOR P18 Recombine xL and xR The F function is: F(xL) = ((S1,a + S2,b mod 232) XOR S3,c) + S4,d mod 232 where a,b,c,d are four 8 bit quartered derived from xL. Decryption is the same as encryption, except the P-arrays are used in reverse. Output Some example input and output of the Blowfish algorithm. $ ./Blowfish 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Key: 0 0 0 0 0 0 0 0 Plaintext: 0 0 0 0 0 0 0 0 IV. CONCLUSION The phenomenon in cloud computing shows a interest through worldwide because of its lower ownership, scalability, competitive differentiation, reduced complexity for customers, and faster and easier services.cloud offers several advantages, people can see cloud computing from different points of view. Some people think that cloud is unsafe. But few people find it safer for provisioning, especially small businesses. Several large organizations and some government agencies are still holding back. They indicate that they will not consider soon because they have no good way to quantify their risks. To gain total acceptance from all potential users cloud computing require some standardization in the security. In this paper we implemented security in cloud using blowfish as a future work some other technique can be used. REFERENCE [1] http://csrc.nist.gov/groups/SNS/cloud- computing/index.html, [2] Cisco White Paper, [3] http://www.cisco.com/en/US/solutions/collateral/ns 341/ns525/ns537/white_paper_c11-532553.html, published 2009, pp.1-6. [4] John Viega, McAffee, Cloud Computing and the Common Man,” published on the IEEE Journal ON Cloud Computing Security, pp. 106-108, August 2009. [5] George Reese, “Cloud Application Architectures”, First edition, O’Reilly Media, April 2009, ISBN 9780596156367, pp. 2-4, 99-118.
  • 3. Data Security in Cloud using Blowfish Algorithm (IJSRD/Vol. 2/Issue 09/2014/117) All rights reserved by www.ijsrd.com 525 [6] http://en.wikipedia.org/wiki/Cloud_computing. [7] http://communication.howstuffworks.com/cloud computing1.htm. [8] John Harauz, Lori M. Kaufman, Bruce Potter, “Data Security in the World of Cloud Computing,” published on the IEEE Journal on Cloud Computing Security, July/August 2009, Vol. 7, No.4, pp. 61-64. [9] John W. Rittinghouse, James F. Ransome, “Cloud Computing Implementation, Management, and Security”, CRC Press, August 17, 2009, ISBN 9781439806807, pp. 147-158, 183-212. [10]Amazon White Paper, http://aws.amazon.com/about-aws/whats- new/2009/06/08/new-aws-security-center-and- security-whitepaper/, published June 2009. [11]Marco Descher, Philip Masser, Thomas Feilhauer, A Min Tjoa, David Huemer, “ Retaining Data Control to the Client Infrastructure Clouds”, published on the IEEE, 2009 International Conference on Availability, Reliability and Security, pp. 9-15. [12]David Bernstein, Erik Ludvigson, Krishna Sankar, Steve Diamond, Monique Morrow, “Blueprint for the Intercloud – Protocols and Formats for Cloud Computing Interoperability, submitted to IEEE, 2009 Fourth International Conference on Internet and Web Applications and Services, pp. 328-335. [13]Liang-Jie Zhang, Qun Zhou, “CCOA: Cloud Computing Open Architecture”, published on IEEE, 2009 IEEE International Conference on Web Services, pp. 607-615. [14]Amazon White Paper, “Introduction to Amazon Virtual Private Cloud”, Available: http://aws.amazon.com/about-aws/whats- new/2009/08/26/introducing-amazon-virtual- private-cloud/, published Aug 26, 2009, pp. 6-8. [15]Rajkumar Buyya, Chee Shin Yeo, SrikumarVenugopal, “Market-Oriented Cloud Computing: Vision, Hype, and Reality for Delivering IT Services as Computing Utilities”, grid Computing and Distributed Systems and Software Engineering, The University of Melbourne, Australia. [16]Jinesh Varia, Amazon Web Services, “Building GrepTheWeb in the Cloud, Part 1: Cloud Architectures”, Available: http://developer.amazonwebservices.com/connect, July 2008, pp. 1-7 Jon Brodkin, “Gartner: Seven Cloud Computing Security Risks”, Available: http://www.infoworld.com, published July 2008, pp. 1-3.