EconPapers    
Economics at your fingertips  
 

Survey of Blowfish Algorithm for Cloud

Shamil Ezadeen ()

Technium, 2022, vol. 4, issue 6, 18-28

Abstract: Security is the study of encryption and decryption, data hiding, potential attacks, and performance evaluation. Many algorithms perform this purpose. Blowfish is a symmetric block cipher that uses the Feistel network. Although several works employed the Blowfish algorithm for the security of the cloud, there is still no article that lists previous studies. Cloud computing is the transmission of computer services such as servers, storage, databases, networking, software, analytics, and intelligence through the Internet ("the cloud") in order to provide faster innovation, more flexible resources, and cost savings. The most common issue with cloud computing is information security, privacy, confidentiality, and how the cloud provider ensures these services. This paper includes a survey of most previous works that were concerned with using the Blowfish algorithm in achieving cloud security

Date: 2022
References: View references in EconPapers View complete reference list from CitEc
Citations: View citations in EconPapers (1)

Downloads: (external link)
https://techniumscience.com/index.php/technium/article/view/6791 (application/pdf)
https://techniumscience.com/index.php/technium/article/download/6791/2418 (text/html)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:tec:techni:v:4:y:2022:i:6:p:18-28

DOI: 10.47577/technium.v4i6.6791

Access Statistics for this article

Technium is currently edited by Scurtu Ionut Cristian

More articles in Technium from Technium Science
Bibliographic data for series maintained by Ana Maria Golita ().

 
Page updated 2025-03-20
Handle: RePEc:tec:techni:v:4:y:2022:i:6:p:18-28