Blowfish Implementation on SoloEncrypt Security Model for User Data Protection Prior to Cloud Storage
American Journal of Computer Science and Technology
Volume 3, Issue 1, March 2020, Pages: 1-6
Received: Oct. 8, 2019; Accepted: Oct. 29, 2019; Published: Mar. 17, 2020
Views 280      Downloads 106
Author
Olaleye Solomon Babatunde, Department of Computer Science, Federal College of Education (Special), Oyo, Nigeria
Article Tools
Follow on us
Abstract
Smartphones' data security has become increasingly important in the advancement of mobile technologies. Users today use smartphones as means of communication, sending and receiving messages, browsing the internet as well as storing sensitive information. Due to these functionalities smartphones today are preferred targets of attacks. Hence, the foremost goal of this work is to provide security for user data on smartphones by the implementation of Blowfish encryption algorithm prior to cloud storage. Blowfish encryption algorithm is a popular and well tested cryptographic algorithm to provide security for user data in mobile cloud computing. Further, there is the need for the development of a mobile application to provide the needed security on smartphones using this existing algorithm. This paper therefore proposed a Secure App using java + xml which was implemented on SoloEncrypt security model. Three Android devices were used to carry out the experiment; Samsung Galaxy On7 Prime, Samsung Galaxy J2 Pro and Samsung Galaxy J7 Nxt. Encryption time and decryption time were parameters used for evaluating the encryption algorithm which are among the standardized metrics approved by the National Institute of Standards and Technology (NIST). The experimental results revealed that the algorithm encrypts with better speed and it takes less time to decrypt when compared with related work.
Keywords
Blowfish, SoloEncrypt, Data Security, Cloud Storage, Smartphones
To cite this article
Olaleye Solomon Babatunde, Blowfish Implementation on SoloEncrypt Security Model for User Data Protection Prior to Cloud Storage, American Journal of Computer Science and Technology. Vol. 3, No. 1, 2020, pp. 1-6. doi: 10.11648/j.ajcst.20200301.11
Copyright
Copyright © 2020 Authors retain the copyright of this article.
This article is an open access article distributed under the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/) which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
References
[1]
Bhavya, S., Sugandha, S. & Mayank, A. (2014). Securing smartphone data by offloading computation on cloud. International Journal of Emerging Technology and Advanced Engineering, Vol. 4, No. 7, pp. 949-958.
[2]
Ramgovind, S, Eloff, M. M. & Smith, E. (2014). The management of security in cloud computing, Unpublished MSc Thesis, School of Computing, University of South Africa, Pretoria, South Africa.
[3]
Niroshinie, F., Seng, W. L. & Wenny, R. (2012). Mobile cloud computing: A survey. Elsevier. www.elsevier.com/locate/fgcs, pp. 85-106.
[4]
Donald, A. C., Oli, S. A. & Arockiam, L. (2013). Mobile cloud security issues and challenges: A perspective. International Journal of Engineering and Innovative Technology, Vol. 3, No. 1, pp. 401-406.
[5]
Ria, D. & Indrajit, D. (2013). Smartphone security by cloud computing. International Journal of Innovations in Engineering and Technology, Vol. 2, Issue 3, pp. 122-130.
[6]
Cisco (2010). Annual security report. http://www.cisco.com/en/us/prod/collateral/vpndevc/security_annual_report_2010.pdf. Accessed 27th August 2019.
[7]
Olaleye, S. B., Ranjan, I. & Ojha, S. K. (2017). SoloEncrypt: A smartphone storage enhancement security model for securing users sensitive data. Indian Journal of Science and Technology, Vol. 10, Issue 8, pp. 1-8.
[8]
Poonguzhali, P., Dhanokar, P., Chaithanya, M. K. & Patil, M. U. (2016). Secure storage of data on android based devices. International Journal of Engineering and Technology, Vol. 8, No. 3, pp. 177-182.
[9]
Federal IT Market Forecast 2011 – 2015, U. S. (2010). Market research media, September 2010 update, Accessed 24th August 2019.
[10]
Weizhe, Z., Hui, H., Qizhen, Z. & Tai-hoon, K. (2014). Phone protector: Protecting user privacy on the Android-based mobile platform. International Journal of Institute of Distributed Sensor Networks, 2014, pp. 1-10.
[11]
Tiwari, M., Srivastava, A. K. & Gupta, N. (2013). Review on android and smartphone security. Research Journal of Computer and Information Technology Sciences, Vol. 1, No. 6, pp. 12- 19.
[12]
Brodkin, J. (2009). Gartner: Seven cloud computing security risks. http://www. infoworld.com/d/security-central/gartner-seven-cloudcomputingsecurity-risks-853. Accessed 13th August 2019.
[13]
Gonsai, A. M. & Raval, L. M. (2014). Evaluation of common encryption algorithm and scope of advanced algorithm for simulated wireless network. International Journal of computer Trends and Technology (IJCTT), pp. 7-12.
[14]
Elminaam, D. S. A., Kader, H. M. A. & Hadhoud, M. M. (2012). Performance evaluation of symmetric encryption algorithms. A publication of International Business Information Management Association (IBIMA), Vol. 8, pp. 58-64.
[15]
Ghosh, S. & Karar, V. (2018). Blowfish Hybridized Weighted Attribute-Based Encryption for Secure and Efficient Data Collaboration in Cloud Computing. Applied Science, 2018, 8, 1119, pp. 11-15.
ADDRESS
Science Publishing Group
1 Rockefeller Plaza,
10th and 11th Floors,
New York, NY 10020
U.S.A.
Tel: (001)347-983-5186