American Journal of Computer Science and Technology

| Peer-Reviewed |

Blowfish Implementation on SoloEncrypt Security Model for User Data Protection Prior to Cloud Storage

Received: 08 October 2019    Accepted: 29 October 2019    Published: 17 March 2020
Views:       Downloads:

Share This Article

Abstract

Smartphones' data security has become increasingly important in the advancement of mobile technologies. Users today use smartphones as means of communication, sending and receiving messages, browsing the internet as well as storing sensitive information. Due to these functionalities smartphones today are preferred targets of attacks. Hence, the foremost goal of this work is to provide security for user data on smartphones by the implementation of Blowfish encryption algorithm prior to cloud storage. Blowfish encryption algorithm is a popular and well tested cryptographic algorithm to provide security for user data in mobile cloud computing. Further, there is the need for the development of a mobile application to provide the needed security on smartphones using this existing algorithm. This paper therefore proposed a Secure App using java + xml which was implemented on SoloEncrypt security model. Three Android devices were used to carry out the experiment; Samsung Galaxy On7 Prime, Samsung Galaxy J2 Pro and Samsung Galaxy J7 Nxt. Encryption time and decryption time were parameters used for evaluating the encryption algorithm which are among the standardized metrics approved by the National Institute of Standards and Technology (NIST). The experimental results revealed that the algorithm encrypts with better speed and it takes less time to decrypt when compared with related work.

DOI 10.11648/j.ajcst.20200301.11
Published in American Journal of Computer Science and Technology (Volume 3, Issue 1, March 2020)
Page(s) 1-6
Creative Commons

This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited.

Copyright

Copyright © The Author(s), 2024. Published by Science Publishing Group

Keywords

Blowfish, SoloEncrypt, Data Security, Cloud Storage, Smartphones

References
[1] Bhavya, S., Sugandha, S. & Mayank, A. (2014). Securing smartphone data by offloading computation on cloud. International Journal of Emerging Technology and Advanced Engineering, Vol. 4, No. 7, pp. 949-958.
[2] Ramgovind, S, Eloff, M. M. & Smith, E. (2014). The management of security in cloud computing, Unpublished MSc Thesis, School of Computing, University of South Africa, Pretoria, South Africa.
[3] Niroshinie, F., Seng, W. L. & Wenny, R. (2012). Mobile cloud computing: A survey. Elsevier. www.elsevier.com/locate/fgcs, pp. 85-106.
[4] Donald, A. C., Oli, S. A. & Arockiam, L. (2013). Mobile cloud security issues and challenges: A perspective. International Journal of Engineering and Innovative Technology, Vol. 3, No. 1, pp. 401-406.
[5] Ria, D. & Indrajit, D. (2013). Smartphone security by cloud computing. International Journal of Innovations in Engineering and Technology, Vol. 2, Issue 3, pp. 122-130.
[6] Cisco (2010). Annual security report. http://www.cisco.com/en/us/prod/collateral/vpndevc/security_annual_report_2010.pdf. Accessed 27th August 2019.
[7] Olaleye, S. B., Ranjan, I. & Ojha, S. K. (2017). SoloEncrypt: A smartphone storage enhancement security model for securing users sensitive data. Indian Journal of Science and Technology, Vol. 10, Issue 8, pp. 1-8.
[8] Poonguzhali, P., Dhanokar, P., Chaithanya, M. K. & Patil, M. U. (2016). Secure storage of data on android based devices. International Journal of Engineering and Technology, Vol. 8, No. 3, pp. 177-182.
[9] Federal IT Market Forecast 2011 – 2015, U. S. (2010). Market research media, September 2010 update, Accessed 24th August 2019.
[10] Weizhe, Z., Hui, H., Qizhen, Z. & Tai-hoon, K. (2014). Phone protector: Protecting user privacy on the Android-based mobile platform. International Journal of Institute of Distributed Sensor Networks, 2014, pp. 1-10.
[11] Tiwari, M., Srivastava, A. K. & Gupta, N. (2013). Review on android and smartphone security. Research Journal of Computer and Information Technology Sciences, Vol. 1, No. 6, pp. 12- 19.
[12] Brodkin, J. (2009). Gartner: Seven cloud computing security risks. http://www. infoworld.com/d/security-central/gartner-seven-cloudcomputingsecurity-risks-853. Accessed 13th August 2019.
[13] Gonsai, A. M. & Raval, L. M. (2014). Evaluation of common encryption algorithm and scope of advanced algorithm for simulated wireless network. International Journal of computer Trends and Technology (IJCTT), pp. 7-12.
[14] Elminaam, D. S. A., Kader, H. M. A. & Hadhoud, M. M. (2012). Performance evaluation of symmetric encryption algorithms. A publication of International Business Information Management Association (IBIMA), Vol. 8, pp. 58-64.
[15] Ghosh, S. & Karar, V. (2018). Blowfish Hybridized Weighted Attribute-Based Encryption for Secure and Efficient Data Collaboration in Cloud Computing. Applied Science, 2018, 8, 1119, pp. 11-15.
Author Information
  • Department of Computer Science, Federal College of Education (Special), Oyo, Nigeria

Cite This Article
  • APA Style

    Olaleye Solomon Babatunde. (2020). Blowfish Implementation on SoloEncrypt Security Model for User Data Protection Prior to Cloud Storage. American Journal of Computer Science and Technology, 3(1), 1-6. https://doi.org/10.11648/j.ajcst.20200301.11

    Copy | Download

    ACS Style

    Olaleye Solomon Babatunde. Blowfish Implementation on SoloEncrypt Security Model for User Data Protection Prior to Cloud Storage. Am. J. Comput. Sci. Technol. 2020, 3(1), 1-6. doi: 10.11648/j.ajcst.20200301.11

    Copy | Download

    AMA Style

    Olaleye Solomon Babatunde. Blowfish Implementation on SoloEncrypt Security Model for User Data Protection Prior to Cloud Storage. Am J Comput Sci Technol. 2020;3(1):1-6. doi: 10.11648/j.ajcst.20200301.11

    Copy | Download

  • @article{10.11648/j.ajcst.20200301.11,
      author = {Olaleye Solomon Babatunde},
      title = {Blowfish Implementation on SoloEncrypt Security Model for User Data Protection Prior to Cloud Storage},
      journal = {American Journal of Computer Science and Technology},
      volume = {3},
      number = {1},
      pages = {1-6},
      doi = {10.11648/j.ajcst.20200301.11},
      url = {https://doi.org/10.11648/j.ajcst.20200301.11},
      eprint = {https://download.sciencepg.com/pdf/10.11648.j.ajcst.20200301.11},
      abstract = {Smartphones' data security has become increasingly important in the advancement of mobile technologies. Users today use smartphones as means of communication, sending and receiving messages, browsing the internet as well as storing sensitive information. Due to these functionalities smartphones today are preferred targets of attacks. Hence, the foremost goal of this work is to provide security for user data on smartphones by the implementation of Blowfish encryption algorithm prior to cloud storage. Blowfish encryption algorithm is a popular and well tested cryptographic algorithm to provide security for user data in mobile cloud computing. Further, there is the need for the development of a mobile application to provide the needed security on smartphones using this existing algorithm. This paper therefore proposed a Secure App using java + xml which was implemented on SoloEncrypt security model. Three Android devices were used to carry out the experiment; Samsung Galaxy On7 Prime, Samsung Galaxy J2 Pro and Samsung Galaxy J7 Nxt. Encryption time and decryption time were parameters used for evaluating the encryption algorithm which are among the standardized metrics approved by the National Institute of Standards and Technology (NIST). The experimental results revealed that the algorithm encrypts with better speed and it takes less time to decrypt when compared with related work.},
     year = {2020}
    }
    

    Copy | Download

  • TY  - JOUR
    T1  - Blowfish Implementation on SoloEncrypt Security Model for User Data Protection Prior to Cloud Storage
    AU  - Olaleye Solomon Babatunde
    Y1  - 2020/03/17
    PY  - 2020
    N1  - https://doi.org/10.11648/j.ajcst.20200301.11
    DO  - 10.11648/j.ajcst.20200301.11
    T2  - American Journal of Computer Science and Technology
    JF  - American Journal of Computer Science and Technology
    JO  - American Journal of Computer Science and Technology
    SP  - 1
    EP  - 6
    PB  - Science Publishing Group
    SN  - 2640-012X
    UR  - https://doi.org/10.11648/j.ajcst.20200301.11
    AB  - Smartphones' data security has become increasingly important in the advancement of mobile technologies. Users today use smartphones as means of communication, sending and receiving messages, browsing the internet as well as storing sensitive information. Due to these functionalities smartphones today are preferred targets of attacks. Hence, the foremost goal of this work is to provide security for user data on smartphones by the implementation of Blowfish encryption algorithm prior to cloud storage. Blowfish encryption algorithm is a popular and well tested cryptographic algorithm to provide security for user data in mobile cloud computing. Further, there is the need for the development of a mobile application to provide the needed security on smartphones using this existing algorithm. This paper therefore proposed a Secure App using java + xml which was implemented on SoloEncrypt security model. Three Android devices were used to carry out the experiment; Samsung Galaxy On7 Prime, Samsung Galaxy J2 Pro and Samsung Galaxy J7 Nxt. Encryption time and decryption time were parameters used for evaluating the encryption algorithm which are among the standardized metrics approved by the National Institute of Standards and Technology (NIST). The experimental results revealed that the algorithm encrypts with better speed and it takes less time to decrypt when compared with related work.
    VL  - 3
    IS  - 1
    ER  - 

    Copy | Download

  • Sections