• 제목/요약/키워드: Blowfish Algorithm

검색결과 2건 처리시간 0.015초

De-Centralized Information Flow Control for Cloud Virtual Machines with Blowfish Encryption Algorithm

  • Gurav, Yogesh B.;Patil, Bankat M.
    • International Journal of Computer Science & Network Security
    • /
    • 제21권12호
    • /
    • pp.235-247
    • /
    • 2021
  • Today, the cloud computing has become a major demand of many organizations. The major reason behind this expansion is due to its cloud's sharing infrastructure with higher computing efficiency, lower cost and higher fle3xibility. But, still the security is being a hurdle that blocks the success of the cloud computing platform. Therefore, a novel Multi-tenant Decentralized Information Flow Control (MT-DIFC) model is introduced in this research work. The proposed system will encapsulate four types of entities: (1) The central authority (CA), (2) The encryption proxy (EP), (3) Cloud server CS and (4) Multi-tenant Cloud virtual machines. Our contribution resides within the encryption proxy (EP). Initially, the trust level of all the users within each of the cloud is computed using the proposed two-stage trust computational model, wherein the user is categorized bas primary and secondary users. The primary and secondary users vary based on the application and data owner's preference. Based on the computed trust level, the access privilege is provided to the cloud users. In EP, the cipher text information flow security strategy is implemented using the blowfish encryption model. For the data encryption as well as decryption, the key generation is the crucial as well as the challenging part. In this research work, a new optimal key generation is carried out within the blowfish encryption Algorithm. In the blowfish encryption Algorithm, both the data encryption as well as decryption is accomplishment using the newly proposed optimal key. The proposed optimal key has been selected using a new Self Improved Cat and Mouse Based Optimizer (SI-CMBO), which has been an advanced version of the standard Cat and Mouse Based Optimizer. The proposed model is validated in terms of encryption time, decryption time, KPA attacks as well.

Linux 운영체제 동적 모듈 개념을 이용한 보안 파일 시스템 모듈 설계 (Design of the Security Cryptography File System Based on the Dynamic Linking Module on the Linux O.S)

  • 장승주;이정배
    • 정보처리학회논문지C
    • /
    • 제10C권7호
    • /
    • pp.929-936
    • /
    • 2003
  • 본 논문은 Linux 운영체제에서 동적 모듈 개념을 이용하여 보안 파일 시스템을 설계하였다. Linux 운영체제에서 동적 모듈 개념을 이용할 경우 커널 소스를 수정하지 않고 사용자가 원할 경우 커널 모듈은 언제든지 추가할 수 있는 장점을 가진다. 보안 파일 시스템은 사용자 데이터를 암호화함으로서 접근이 허용되지 않은 사용자에게 중요한 자료가 노출되지 않도록 해준다. 보안 파일 시스템은 blowfish 알고리즘을 사용하여 암호 및 복호화를 수행한다. 키 생성을 위하여 키 서버를 통하지 않고 자체 키 생성 알고리즘에 의하여 키를 만든 후 이 키 값을 이용한다.