Impact Factor (2025): 6.9
DOI Prefix: 10.47001/IRJIET
This
proposed hybrid algorithm can be made much more powerful and secure by
increasing the number of iterations in the encryption algorithm to suit the
level of security required. An inverse policy of reducing the number of
iterations for lower security can also be employed. Blowfish used for the
encryption of file slices takes minimum time and has maximum throughput for
encryption and decryption from other symmetric algorithms. The idea of
splitting and merging adds on to meet the principle of data security. This
system can be implemented into banking and corporate sectors to securely
transfer confidential data in the world of data being the key asset,
safeguarding our asset are primary responsibility. Communications, databases,
infrastructure, transactions, knowledge; an organization’s data is arguably its
most valuable asset. It is in a business’ best interests to keep its
information safe, regardless of legal or regulatory requirements. For data
security and privacy protection issues, the fundamental challenge of separation
of sensitive data and access control is fulfilled. Cryptography technique
translates original data into unreadable form. Cryptography technique is
divided into symmetric key cryptography and public key cryptography. This
technique uses keys for translate data into unreadable form. So only authorized
person can access data from cloud server. Cipher text data is visible for all
people.
Country : India
IRJIET, Volume 7, Issue 5, May 2023 pp. 351-356