Blowfish based encryption model in real cloud environment

R. Walia, P. Garg, Manish Kumar
{"title":"Blowfish based encryption model in real cloud environment","authors":"R. Walia, P. Garg, Manish Kumar","doi":"10.32629/jai.v6i3.695","DOIUrl":null,"url":null,"abstract":"The introduction of the internet has made security a top anxiety. And the preceding of security permits for improved knowledge in the creation of security tools. Several concerns about safekeeping might have arisen just from the way the internet was set up. Many businesses use firewalls and encryption techniques to protect themselves online. Businesses can design an “intranet” that is protected from potential risks while being linked to the internet. For increased security, better encryption techniques are needed to retain data integrity. For better encryption, it is essential to consider into explanation a few of issues, including key size, chunk size, and encoding ratio. Documents transferred to subordinate storage strategies (such as Hard disk or SD card) must be encrypted to provide security and prevent unwanted access. If a key is kept on secondary storage with the document, it is quite simple to decrypt it. It is desirable to create encryption keys from operator passwords when encoding or decoding the folder rather than keeping the key together with the document.","PeriodicalId":70721,"journal":{"name":"自主智能(英文)","volume":" ","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2023-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"自主智能(英文)","FirstCategoryId":"1093","ListUrlMain":"https://doi.org/10.32629/jai.v6i3.695","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The introduction of the internet has made security a top anxiety. And the preceding of security permits for improved knowledge in the creation of security tools. Several concerns about safekeeping might have arisen just from the way the internet was set up. Many businesses use firewalls and encryption techniques to protect themselves online. Businesses can design an “intranet” that is protected from potential risks while being linked to the internet. For increased security, better encryption techniques are needed to retain data integrity. For better encryption, it is essential to consider into explanation a few of issues, including key size, chunk size, and encoding ratio. Documents transferred to subordinate storage strategies (such as Hard disk or SD card) must be encrypted to provide security and prevent unwanted access. If a key is kept on secondary storage with the document, it is quite simple to decrypt it. It is desirable to create encryption keys from operator passwords when encoding or decoding the folder rather than keeping the key together with the document.
真实云环境中基于Blowfish的加密模型
互联网的引入使安全成为人们最担心的问题。安全性的前面允许在创建安全工具方面提高知识。互联网的建立方式可能引发了对安全保护的一些担忧。许多企业使用防火墙和加密技术来保护自己的网络安全。企业可以设计一个“内联网”,在连接到互联网时免受潜在风险的影响。为了提高安全性,需要更好的加密技术来保持数据的完整性。为了更好地加密,必须考虑一些问题的解释,包括密钥大小、块大小和编码率。传输到下级存储策略(如硬盘或SD卡)的文档必须加密,以提供安全性并防止不必要的访问。如果密钥与文档一起保存在辅助存储器中,则解密它非常简单。在对文件夹进行编码或解码时,最好使用操作员密码创建加密密钥,而不是将密钥与文档放在一起。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
CiteScore
0.40
自引率
0.00%
发文量
25
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信