Cloud Storage Data Security Using BLOWFISH-ECC Model
Main Article Content
Abstract
In a cloud computing system, the end user can store and retrieve personal data more affordably over remote storage via an Internet connection. The user can access data whenever they want and from anywhere. But cloud-based data transmission isn't always safe. Because the end user can only access the data with a third party's assistance, data integrity and authentication can be jeopardized. Furthermore, because cloud computing allows multiple users to access and retrieve their data online via different Internet connections, sensitive user data may be lost, exposed, or leaked in a number of different locations. Numerous algorithms and protocols have been created in order to guarantee the security and integrity of the data utilizing cryptographic methods like Elliptic Curve Cryptography (ECC). This study offers a way for exchanging cloud data that is secure and reliable while maintaining the integrity of the data. The proposed system primarily uses the ECC and Blowfish (BF) approach to provide authentication and data integrity. When compared to existing methods, the experimental results show that the suggested strategy is efficient and yields superior outcomes.