Survey of Blowfish Algorithm for Cloud
Shamil Ezadeen ()
Technium, 2022, vol. 4, issue 6, 18-28
Abstract:
Security is the study of encryption and decryption, data hiding, potential attacks, and performance evaluation. Many algorithms perform this purpose. Blowfish is a symmetric block cipher that uses the Feistel network. Although several works employed the Blowfish algorithm for the security of the cloud, there is still no article that lists previous studies. Cloud computing is the transmission of computer services such as servers, storage, databases, networking, software, analytics, and intelligence through the Internet ("the cloud") in order to provide faster innovation, more flexible resources, and cost savings. The most common issue with cloud computing is information security, privacy, confidentiality, and how the cloud provider ensures these services. This paper includes a survey of most previous works that were concerned with using the Blowfish algorithm in achieving cloud security
Date: 2022
References: View references in EconPapers View complete reference list from CitEc
Citations: View citations in EconPapers (1)
Downloads: (external link)
https://techniumscience.com/index.php/technium/article/view/6791 (application/pdf)
https://techniumscience.com/index.php/technium/article/download/6791/2418 (text/html)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:tec:techni:v:4:y:2022:i:6:p:18-28
DOI: 10.47577/technium.v4i6.6791
Access Statistics for this article
Technium is currently edited by Scurtu Ionut Cristian
More articles in Technium from Technium Science
Bibliographic data for series maintained by Ana Maria Golita ().