SlideShare a Scribd company logo
1 of 5
Download to read offline
© 2018, AJCSE. All Rights Reserved 22
RESEARCH ARTICLE
Fog and Internet of Things Network Security through Blowfish Cipher
B. Usharani
Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation, Green Fields,
Guntur, Andhra Pradesh, India
Received: 02-12-2017; Revised: 25-12-2017; Accepted: 20-01-2018
ABSTRACT
The data are stored and accessed in a cloud from the remote server with the help of services provided by
cloud service providers. Security is a major issue as the data are transmitted to the remote server through
the internet. Encryption is a better solution to secure the information when storing data at remote servers.
Fog computing is evolved to overcome the security issues in cloud. Still, there are some data security
issues in fog computing. An encryption algorithm plays a key role in the cloud security. Network-based
intrusion prevention system is used to detect threats in real time. To provide a secure data access in cloud,
advanced encryption techniques can be used for storing and retrieving data from cloud. Furthermore,
proper key management techniques can be used to distribute the key to the cloud users such that only
authorized persons can access the data. The Blowfish encryption can never be hacked. In this paper,
Blowfish cipher technique is implemented for the security to fog of internet of things network.
Key words: Blowfish, cipher techniques, fog, internet of things, network security
INTRODUCTION
As the number of devices connected to internet
increases, there would be definitely a problem
in storage and information retrieval process. Fog
computing has been introduced overcome the
security issues in the cloud computing. Huge
amount of data produced by internet of things (IoT)
devices and storing data into cloud and retrieving
is highly difficult. Hence, fog has been introduced.
IoThad led evolution to the fog computing because
of the increased number of devices producing
massive amount of data. In cloud computing, there
are many security issues as of man in the middle
attack and even the encryption of data is not safe
method for cloud. It does not identify the difference
between user and attacker. It does not concentrate
on the security of the data. Cloud provides various
services for storing and accessing of the data in
which the major problem is that failure to provide
security for the data against attackers. It is not
providing any level of assurance to the user about
the security of the data. Hence, developing a more
secure cloud is not enough because there would
Address for correspondence:
B. Usharani,
E-mail: ushareddy.vja@gmail.com
be continuous attacks happening on the cloud, and
there are chances that the data would be leaked
or it might be lost forever. Hence, fog computing
came into existence which is considered to be
the most secure form of data storage. Hence, in
this, we are trying to achieve more security at the
level of fog by introducing encryption to the data
using the Blowfish encryption standard algorithm
technique. The paper introduces Blowfish
algorithm in the fog environment, so whenever
user sends data to fog for storing in the cloud, the
fog will encrypt the data and send it to the cloud.
Moreover, whenever user requests for the data, the
encrypted data travel from cloud to fog and fog
to end user, and the data will be decrypted at end
user.
FOG COMPUTING [FIGURE 1]
In cloud computing concept, all the data produced
from the users will be directly stored into the cloud
and then it is analyzed with massive warehouses
with analytics going on it and then decisions are
made to act on data, and eventually, notifications
are pushed to act on those decisions. In fog
computing, the users will be notified what are the
actions that are needed to be taken on the data and
then analytics are applied on the received data and
Available Online at www.ajcse.info
Asian Journal of Computer Science Engineering 2018;3(1):22-26
ISSN 2581 – 3781
Usharani: Security in Fog by Blowfish
AJCSE/Jan-Mar-2018/Vol 3/Issue 1 23
stored it into the cloud. Fog computing is said to
be an extension of the cloud but not a replacement
of it. As the number of the devices connected to
the internet has been increasing at rapid speed, and
even advancement in the IoT has led this number
to increase drastically [Figure 2].
IoT devices interact with fog nodes only when
they need to offload a processing or storage
request. Any other interactions would not be
considered as part of the fog environment as such
communications would happen as part of the
network. These fog nodes interact with each other
when they need to effectively manage network
resources or to manage network itself. They may
even operate in distributed manner to perform
a specific task. To secure communications in
a fog computing environment, the following
communications between these devices are to be
secured:
1. Communications between constrained - IoT
devices and fog nodes and
2. Communications between fog nodes.
Usually, an IoT device can initiate communication
with any of the fog nodes in the fog network
requesting for a processing or storage requirement.
RELATED WORK
Alrawais et al. discussed the security and privacy
challenges of fog computing in IoT environments.
They discussed how to use fog computing to
improve the security and privacy issues in IoT
environments. In addition, Hong et al. evaluated
the programming model for large scale and
latency sensitive IoT applications exploiting the
fog computing platform. They studied the model
with a camera network and connected vehicle
applications and showed the efficient role of fog
computing in IoT. Al Faruque and Vatanparvar
proposed a software-defined network based on
vehicle ad hoc networking supported by fog
computing. The proposed architecture solves
many issues in vehicle ad hoc networks by rising
the connectivity between vehicles, vehicle-to-
infrastructure, and vehicle to base station while
integrating fog computing to decrease latency and
provide resource utility. Koo and Hur proposed a
deduplication scheme for encrypted data.
CIPHER TECHNIQUES
The original message is called as the plain text.
The coded message is known as ciphertext. The
process of converting plain text to ciphertext is
known as encryption or enciphering.
Cryptographic algorithms and protocols are
divided into four categories:
1. Symmetric encryption
2. Asymmetric encryption
3. Data integrity algorithms
4. Authentication protocols.
Network and Internet security consists of
measures to deter, prevent, detect, and correct
security violations that involve the transmission
of information. A logical information channel
is established by defining the route through the
internet from source to destination by the use of
communication protocols such as transmission
control protocol/internet protocol by the sender
and receiver.
Figure 1: Fog computing architecture
Figure 2: An example for IOT based on fog computing
Usharani: Security in Fog by Blowfish
AJCSE/Jan-Mar-2018/Vol 3/Issue 1 24
Encryption key is used in conjunction with the
transformation to scramble the message before
transmission and unscramble it on receiver side.
Symmetric encryption is a form of cryptosystem
in which encryption and decryption are performed
using the same key. Symmetric encryption
transforms plain text into ciphertext using a secret
key and encryption algorithm.
E(K,X)	 (1)
Symmetric encryption of plain text X using secret
key K.E. is the encryption algorithm applied on
the plain text and key to transform to a ciphertext.
The process of converting ciphertext to plain text
is known as decryption or deciphering. In the
symmetric encryption, using the same key that is
used for encryption and a decryption algorithm,
the plain text is recovered from the ciphertext.
D(K,Y) (2)
Symmetric encryption of ciphertext Y using secret
key K.D. is the decryption algorithm applied on
the ciphertext and key to recover original message.
With the message X and the encryption key
as input, the encryption algorithm forms the
ciphertext Y=(Y1
,Y2
,Y3
,…….Yn
).
Y=E(K,X)
With the cipher message Y and the decryption key
as input, the decryption algorithm forms the plain
text
X=D(K,Y)
Security of an encryption scheme depends on the
length of the key.
BLOWFISH CIPHER TECHNIQUE
Blowfish is an encryption algorithm that can be
used as a replacement for the data encryption
standard (DES) or International Data Encryption
Algorithm (IDEA) algorithms. It is a symmetric
or conventional block cipher that uses a variable-
length key, from 32 bits to 448 bits. Blowfish uses
a 64-bit block size and a key length of any size
from 32 bits to 448 bits. It is a 16-round Feistel
cipher and uses large key-dependent S-boxes. It
uses fixed S-boxes [Figure 3].
Blowfish’s key schedule starts by initializing the
P-array and S-boxes with values derived from the
hexadecimal digits of pi, which contain no obvious
pattern. The secret key is then XORed with the
P-entries in order (cycling the key if necessary).
A 64-bit all-zero block is then encrypted with the
algorithm as it stands. The resultant ciphertext
replaces P1 and P2. The ciphertext is then
encrypted again with the new subkeys, and P3
and P4 are replaced by the new ciphertext. This
continues replacing the entire P-array and all the
S-box entries. In all, the Blowfish encryption
algorithm will run 521 times to generate all the
subkeys - about 4 KB of data is processed.
a. Blowfish flowchart
b. Blowfish data encryption technique [Figures 4
and 5].
Blowfish uses 16 rounds. Each round consists of
key-dependent permutation and a key- and data-
dependent substitution. All operations are XORs
and additions on 32-bit words. The only additional
operations are four indexed array data lookup
tables for each round.
PROPOSED SYSTEM [FIGURE 6]
By selecting the cloud services, the users are able
to store their local data in the remote data server.
The data stored in remote data center can be
accessed or managed through the cloud services
provided by the cloud service providers. Hence,
the data stored in a remote data center for data
processing should be done with utmost care. To
achieve more security at the level of fog, the
proposed system introduces encryption to the data
using the Blowfish encryption standard algorithm
technique. The proposed system introduces
Blowfish algorithm in the fog environment, so
whenever user sends data to fog for storing data
in the cloud, the fog will encrypt the data and
send it to the cloud. When user requests data,
Figure 3: S-box structure
Usharani: Security in Fog by Blowfish
AJCSE/Jan-Mar-2018/Vol 3/Issue 1 25
Figure 4: Flowchart for Blowfish algorithm
the encrypted data travel from cloud to fog and
fog to end user, and the data will be decrypted at
end user. It is very difficult to hack the Blowfish
algorithm. The proposed system presents security
to the network or transmission data by Blowfish
algorithm in fog computing, which makes the data
of the end user more secured while the data are
traveling from cloud to fog or fog to cloud.
CONCLUSIONS
Conventional methods of encryption work on
letters, so their usage has been declined for
blocks. Blowfish algorithm is the replacement
of DES and IDEA algorithms in the cipher
techniques. The advantage of Blowfish is the
variable length of the key size, i.e., from 32
to 448 bits. Blowfish is accepted as a strong
encryption algorithm and fast cipher technique.
The strength of the Blowfish is the generation
of the subkeys, and it is very difficult to the
attacker because it is very complex to identify a
key, i.e., for each key generation, the encryption
routine runs 522 times. In this paper, Blowfish
is implemented in fog network for IoT devices.
An additional layer of security is added for data
retrieval; this makes the intruder very difficult to
hack the data.
Usharani: Security in Fog by Blowfish
AJCSE/Jan-Mar-2018/Vol 3/Issue 1 26
3. Bhadauria R, Sanyal S. A survey on security issues in
cloud computing and associated mitigation techniques.
Int J Comput Appl 2012;47:47-66.
4. Mohammed EM, Ambelkadar HS. Enhanced Data
Security Model on Cloud Computing, 8th
International
Conference on IEEE publication; 2012. p. 12-7.
5. Wang L, von Laszewski G, Kunze M, Tao J, Fu
C, He X, et al. Cloud computing: A perspective study,
new generation computing.Adv Distribut Inf Processing
2010;28:137-46.
6. Khairnar S, Borkar D. Fog computing: A new concept
to minimize the attacks and to provide security in
cloud computing environment. Int J Res Eng Technol
2014;3:124-7.
7. Stojmenovic SIT,Wen S.The Fog Computing Paradigm:
Scenarios and Security Issues. Vol. 02. Federated
Conference on Computer Science and Information
Systems, ACSIS; 2014.
8. Dhande NS. Fog computing: Review of privacy and
security issues. Int J Eng Res General Sci 2015;3:864-8.
9. Stolfo SJ, Salem MB, Keromytis AD. Fog computing:
Mitigating insider data theft attacks in the cloud” IEEE;
2014.
10. NagKS,BhuvaneswariHB,NuthanAC.Implementation
of Advanced Encryption Standard-192 Bit Using
Multiple Keys. Vol. 1, 7. Research and Technology in
the Coming Decades (CRT 2013), National Conference
on Challenges; 2013. p. 27-8.
11. Sumitra G. Comparative analysis of AES and DES
security algorithms. Int J Sci Res Publ 2013;3:1-5.
12. Singh S, Maakar SK, Kumar S. Enhancing the security
of DES algorithm using transposition cryptography
techniques. Int J Adv Res Comput Sci Soft Eng
2013;3:464-71.
13. Kruti RS, Gambhava B. New approach of data
encryption standard algorithm. Int J Soft Comput Eng
2012;2:322.
14. Karthik S, Muruganandam A. Data encryption and
decryption by using triple DES and performance analysis
of crypto system. Int J Sci Eng Res 2014;2:24-31.
15. Sachin M, Kumar D. Implementation and analysis of
AES, DES and triple DES on GSM Copyright. Int J
Comput Sci Netw Security 2010;10:298-303.
16. Singh G, Supriya. A study of encryption algorithms
(RSA, DES, 3DES and AES) for information security.
Int J Comput Appl 2013;67:33-8.
17. Jain R, Jejurkar R, Chopade S, Vaidya S, Sanap M.
AESalgorithm using 512 bit key implementation for
secure communication. Res J Appl Sci Eng Technol
2014;8:2116-20.
18. Saraf KR, Jagtap VP, Mishra AK. Text and image
encryption decryption using advanced encryption
standard. Int J Emerg Trends Technol Comput Sci
2014;3: 118-26.
19. AdvancedEncryptionAlgorithmanditsImplementation.
Available from: https://www.en.wikipedia.org/wiki/
Advanced_Encryption_Standard. [Last accessed on
2015 Jul 07].
Figure 5: Encryption procedure in Blowfish cipher
algorithm
Figure 6: System architecture
REFERENCES
1. Shen Z, Li L, Yan F, Wu X. Cloud Computing System
Based on Trusted Computing Platform, International
Conference on Intelligent Computation Technology and
Automation. Vol. 1; 2010. p. 942-5.
2. Pearson S, Benameur A. Privacy, Security and Trust
IssuesArises from Cloud Computing, Cloud Computing
Technology and Science (CloudCom), IEEE Second
International Conference; 2010. p. 693-702.
AQ4
Author Queries???
AQ4: Kindly cite references 1-19 in the text part

More Related Content

Similar to Fog and Internet of Things Network Security through Blowfish Cipher

ijrrest_vol-2_issue-2_015
ijrrest_vol-2_issue-2_015ijrrest_vol-2_issue-2_015
ijrrest_vol-2_issue-2_015Ashish Gupta
 
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET- Data Security in Cloud Computing using Cryptographic AlgorithmsIRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET- Data Security in Cloud Computing using Cryptographic AlgorithmsIRJET Journal
 
cloud security using Fog Computing
cloud security using Fog Computingcloud security using Fog Computing
cloud security using Fog Computingarchana lisbon
 
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computingAlexander Decker
 
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computingAlexander Decker
 
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...IRJET Journal
 
Data Partitioning In Cloud Storage Using DESD Crypto Technique
Data Partitioning In Cloud Storage Using DESD Crypto TechniqueData Partitioning In Cloud Storage Using DESD Crypto Technique
Data Partitioning In Cloud Storage Using DESD Crypto TechniqueIJCSIS Research Publications
 
IRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET - Multimedia Security on Cloud Computing using CryptographyIRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET - Multimedia Security on Cloud Computing using CryptographyIRJET Journal
 
Improved Image Encryption for Real-Time Application over Wireless Communicati...
Improved Image Encryption for Real-Time Application over Wireless Communicati...Improved Image Encryption for Real-Time Application over Wireless Communicati...
Improved Image Encryption for Real-Time Application over Wireless Communicati...ijeei-iaes
 
IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET Journal
 
A data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computingA data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computingIJECEIAES
 
Integrity verification for an optimized cloud architecture
Integrity verification for an optimized cloud architectureIntegrity verification for an optimized cloud architecture
Integrity verification for an optimized cloud architectureTELKOMNIKA JOURNAL
 
DNA computing based stream cipher for internet of things using MQTT protocol
DNA computing based stream cipher for internet of things using MQTT protocol DNA computing based stream cipher for internet of things using MQTT protocol
DNA computing based stream cipher for internet of things using MQTT protocol IJECEIAES
 
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...IJSRD
 
Dual method cryptography image by two force secure and steganography secret m...
Dual method cryptography image by two force secure and steganography secret m...Dual method cryptography image by two force secure and steganography secret m...
Dual method cryptography image by two force secure and steganography secret m...TELKOMNIKA JOURNAL
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET Journal
 
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentEfficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentIJCNCJournal
 
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentEfficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentIJCNCJournal
 

Similar to Fog and Internet of Things Network Security through Blowfish Cipher (20)

ijrrest_vol-2_issue-2_015
ijrrest_vol-2_issue-2_015ijrrest_vol-2_issue-2_015
ijrrest_vol-2_issue-2_015
 
9. 23765.pdf
9. 23765.pdf9. 23765.pdf
9. 23765.pdf
 
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET- Data Security in Cloud Computing using Cryptographic AlgorithmsIRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms
 
cloud security using Fog Computing
cloud security using Fog Computingcloud security using Fog Computing
cloud security using Fog Computing
 
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing
 
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing
 
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...
 
Data Partitioning In Cloud Storage Using DESD Crypto Technique
Data Partitioning In Cloud Storage Using DESD Crypto TechniqueData Partitioning In Cloud Storage Using DESD Crypto Technique
Data Partitioning In Cloud Storage Using DESD Crypto Technique
 
IRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET - Multimedia Security on Cloud Computing using CryptographyIRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET - Multimedia Security on Cloud Computing using Cryptography
 
Improved Image Encryption for Real-Time Application over Wireless Communicati...
Improved Image Encryption for Real-Time Application over Wireless Communicati...Improved Image Encryption for Real-Time Application over Wireless Communicati...
Improved Image Encryption for Real-Time Application over Wireless Communicati...
 
IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud Computing
 
A data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computingA data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computing
 
Integrity verification for an optimized cloud architecture
Integrity verification for an optimized cloud architectureIntegrity verification for an optimized cloud architecture
Integrity verification for an optimized cloud architecture
 
DNA computing based stream cipher for internet of things using MQTT protocol
DNA computing based stream cipher for internet of things using MQTT protocol DNA computing based stream cipher for internet of things using MQTT protocol
DNA computing based stream cipher for internet of things using MQTT protocol
 
Fog computing
Fog computingFog computing
Fog computing
 
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
 
Dual method cryptography image by two force secure and steganography secret m...
Dual method cryptography image by two force secure and steganography secret m...Dual method cryptography image by two force secure and steganography secret m...
Dual method cryptography image by two force secure and steganography secret m...
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
 
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentEfficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
 
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentEfficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
 

More from BRNSSPublicationHubI

Computational Dual-system Imaging Processing Methods for Lumbar Spine Specime...
Computational Dual-system Imaging Processing Methods for Lumbar Spine Specime...Computational Dual-system Imaging Processing Methods for Lumbar Spine Specime...
Computational Dual-system Imaging Processing Methods for Lumbar Spine Specime...BRNSSPublicationHubI
 
Prediction of Neurological Disorder using Classification Approach
Prediction of Neurological Disorder using Classification ApproachPrediction of Neurological Disorder using Classification Approach
Prediction of Neurological Disorder using Classification ApproachBRNSSPublicationHubI
 
On increasing of the Density of Elements of Field-effect Heterotransistors Fr...
On increasing of the Density of Elements of Field-effect Heterotransistors Fr...On increasing of the Density of Elements of Field-effect Heterotransistors Fr...
On increasing of the Density of Elements of Field-effect Heterotransistors Fr...BRNSSPublicationHubI
 
On Optimization of Manufacturing of Field-effect Transistors to Increase Thei...
On Optimization of Manufacturing of Field-effect Transistors to Increase Thei...On Optimization of Manufacturing of Field-effect Transistors to Increase Thei...
On Optimization of Manufacturing of Field-effect Transistors to Increase Thei...BRNSSPublicationHubI
 
The Optimization-based Approaches for Task Scheduling to Enhance the Resource...
The Optimization-based Approaches for Task Scheduling to Enhance the Resource...The Optimization-based Approaches for Task Scheduling to Enhance the Resource...
The Optimization-based Approaches for Task Scheduling to Enhance the Resource...BRNSSPublicationHubI
 
Contactless Real-Time Vital Signs Monitoring Using a Webcam
Contactless Real-Time Vital Signs Monitoring Using a WebcamContactless Real-Time Vital Signs Monitoring Using a Webcam
Contactless Real-Time Vital Signs Monitoring Using a WebcamBRNSSPublicationHubI
 
Secure and Energy Savings Communication of Flying Ad Hoc Network for Rescue O...
Secure and Energy Savings Communication of Flying Ad Hoc Network for Rescue O...Secure and Energy Savings Communication of Flying Ad Hoc Network for Rescue O...
Secure and Energy Savings Communication of Flying Ad Hoc Network for Rescue O...BRNSSPublicationHubI
 
A Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
A Survey on Secure Routing Protocol for Data Transmission in ad hoc NetworksA Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
A Survey on Secure Routing Protocol for Data Transmission in ad hoc NetworksBRNSSPublicationHubI
 
FPGA Hardware Design of Different LDPC Applications: Survey
FPGA Hardware Design of Different LDPC Applications: SurveyFPGA Hardware Design of Different LDPC Applications: Survey
FPGA Hardware Design of Different LDPC Applications: SurveyBRNSSPublicationHubI
 
Design and Implementation of Smart Air Pollution Monitoring System Based on I...
Design and Implementation of Smart Air Pollution Monitoring System Based on I...Design and Implementation of Smart Air Pollution Monitoring System Based on I...
Design and Implementation of Smart Air Pollution Monitoring System Based on I...BRNSSPublicationHubI
 
Smart Monitoring System for Substation’ Parameters and Automatic under Freque...
Smart Monitoring System for Substation’ Parameters and Automatic under Freque...Smart Monitoring System for Substation’ Parameters and Automatic under Freque...
Smart Monitoring System for Substation’ Parameters and Automatic under Freque...BRNSSPublicationHubI
 
An Automatic Coronavirus Detection Systems: Survey
An Automatic Coronavirus Detection Systems: SurveyAn Automatic Coronavirus Detection Systems: Survey
An Automatic Coronavirus Detection Systems: SurveyBRNSSPublicationHubI
 
Manifolds and Catastrophes for Physical Systems
Manifolds and Catastrophes for Physical SystemsManifolds and Catastrophes for Physical Systems
Manifolds and Catastrophes for Physical SystemsBRNSSPublicationHubI
 
Explore the Influencing Variables of Personality Traits on Motives of Adaptin...
Explore the Influencing Variables of Personality Traits on Motives of Adaptin...Explore the Influencing Variables of Personality Traits on Motives of Adaptin...
Explore the Influencing Variables of Personality Traits on Motives of Adaptin...BRNSSPublicationHubI
 
Use of Digital Health Technologies in HealthCare Organization: A System Persp...
Use of Digital Health Technologies in HealthCare Organization: A System Persp...Use of Digital Health Technologies in HealthCare Organization: A System Persp...
Use of Digital Health Technologies in HealthCare Organization: A System Persp...BRNSSPublicationHubI
 
A Predictive Model for Novel Corona Virus Detection with Support Vector Machine
A Predictive Model for Novel Corona Virus Detection with Support Vector MachineA Predictive Model for Novel Corona Virus Detection with Support Vector Machine
A Predictive Model for Novel Corona Virus Detection with Support Vector MachineBRNSSPublicationHubI
 
A Survey on Non-Contact Heart Rate Estimation from Facial Video
A Survey on Non-Contact Heart Rate Estimation from Facial VideoA Survey on Non-Contact Heart Rate Estimation from Facial Video
A Survey on Non-Contact Heart Rate Estimation from Facial VideoBRNSSPublicationHubI
 
Impact of Classification Algorithms on Cardiotocography Dataset for Fetal Sta...
Impact of Classification Algorithms on Cardiotocography Dataset for Fetal Sta...Impact of Classification Algorithms on Cardiotocography Dataset for Fetal Sta...
Impact of Classification Algorithms on Cardiotocography Dataset for Fetal Sta...BRNSSPublicationHubI
 
Improved Particle Swarm Optimization Based on Blockchain Mechanism for Flexib...
Improved Particle Swarm Optimization Based on Blockchain Mechanism for Flexib...Improved Particle Swarm Optimization Based on Blockchain Mechanism for Flexib...
Improved Particle Swarm Optimization Based on Blockchain Mechanism for Flexib...BRNSSPublicationHubI
 
Investigating the Relationship Between Teaching Performance and Research Perf...
Investigating the Relationship Between Teaching Performance and Research Perf...Investigating the Relationship Between Teaching Performance and Research Perf...
Investigating the Relationship Between Teaching Performance and Research Perf...BRNSSPublicationHubI
 

More from BRNSSPublicationHubI (20)

Computational Dual-system Imaging Processing Methods for Lumbar Spine Specime...
Computational Dual-system Imaging Processing Methods for Lumbar Spine Specime...Computational Dual-system Imaging Processing Methods for Lumbar Spine Specime...
Computational Dual-system Imaging Processing Methods for Lumbar Spine Specime...
 
Prediction of Neurological Disorder using Classification Approach
Prediction of Neurological Disorder using Classification ApproachPrediction of Neurological Disorder using Classification Approach
Prediction of Neurological Disorder using Classification Approach
 
On increasing of the Density of Elements of Field-effect Heterotransistors Fr...
On increasing of the Density of Elements of Field-effect Heterotransistors Fr...On increasing of the Density of Elements of Field-effect Heterotransistors Fr...
On increasing of the Density of Elements of Field-effect Heterotransistors Fr...
 
On Optimization of Manufacturing of Field-effect Transistors to Increase Thei...
On Optimization of Manufacturing of Field-effect Transistors to Increase Thei...On Optimization of Manufacturing of Field-effect Transistors to Increase Thei...
On Optimization of Manufacturing of Field-effect Transistors to Increase Thei...
 
The Optimization-based Approaches for Task Scheduling to Enhance the Resource...
The Optimization-based Approaches for Task Scheduling to Enhance the Resource...The Optimization-based Approaches for Task Scheduling to Enhance the Resource...
The Optimization-based Approaches for Task Scheduling to Enhance the Resource...
 
Contactless Real-Time Vital Signs Monitoring Using a Webcam
Contactless Real-Time Vital Signs Monitoring Using a WebcamContactless Real-Time Vital Signs Monitoring Using a Webcam
Contactless Real-Time Vital Signs Monitoring Using a Webcam
 
Secure and Energy Savings Communication of Flying Ad Hoc Network for Rescue O...
Secure and Energy Savings Communication of Flying Ad Hoc Network for Rescue O...Secure and Energy Savings Communication of Flying Ad Hoc Network for Rescue O...
Secure and Energy Savings Communication of Flying Ad Hoc Network for Rescue O...
 
A Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
A Survey on Secure Routing Protocol for Data Transmission in ad hoc NetworksA Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
A Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
 
FPGA Hardware Design of Different LDPC Applications: Survey
FPGA Hardware Design of Different LDPC Applications: SurveyFPGA Hardware Design of Different LDPC Applications: Survey
FPGA Hardware Design of Different LDPC Applications: Survey
 
Design and Implementation of Smart Air Pollution Monitoring System Based on I...
Design and Implementation of Smart Air Pollution Monitoring System Based on I...Design and Implementation of Smart Air Pollution Monitoring System Based on I...
Design and Implementation of Smart Air Pollution Monitoring System Based on I...
 
Smart Monitoring System for Substation’ Parameters and Automatic under Freque...
Smart Monitoring System for Substation’ Parameters and Automatic under Freque...Smart Monitoring System for Substation’ Parameters and Automatic under Freque...
Smart Monitoring System for Substation’ Parameters and Automatic under Freque...
 
An Automatic Coronavirus Detection Systems: Survey
An Automatic Coronavirus Detection Systems: SurveyAn Automatic Coronavirus Detection Systems: Survey
An Automatic Coronavirus Detection Systems: Survey
 
Manifolds and Catastrophes for Physical Systems
Manifolds and Catastrophes for Physical SystemsManifolds and Catastrophes for Physical Systems
Manifolds and Catastrophes for Physical Systems
 
Explore the Influencing Variables of Personality Traits on Motives of Adaptin...
Explore the Influencing Variables of Personality Traits on Motives of Adaptin...Explore the Influencing Variables of Personality Traits on Motives of Adaptin...
Explore the Influencing Variables of Personality Traits on Motives of Adaptin...
 
Use of Digital Health Technologies in HealthCare Organization: A System Persp...
Use of Digital Health Technologies in HealthCare Organization: A System Persp...Use of Digital Health Technologies in HealthCare Organization: A System Persp...
Use of Digital Health Technologies in HealthCare Organization: A System Persp...
 
A Predictive Model for Novel Corona Virus Detection with Support Vector Machine
A Predictive Model for Novel Corona Virus Detection with Support Vector MachineA Predictive Model for Novel Corona Virus Detection with Support Vector Machine
A Predictive Model for Novel Corona Virus Detection with Support Vector Machine
 
A Survey on Non-Contact Heart Rate Estimation from Facial Video
A Survey on Non-Contact Heart Rate Estimation from Facial VideoA Survey on Non-Contact Heart Rate Estimation from Facial Video
A Survey on Non-Contact Heart Rate Estimation from Facial Video
 
Impact of Classification Algorithms on Cardiotocography Dataset for Fetal Sta...
Impact of Classification Algorithms on Cardiotocography Dataset for Fetal Sta...Impact of Classification Algorithms on Cardiotocography Dataset for Fetal Sta...
Impact of Classification Algorithms on Cardiotocography Dataset for Fetal Sta...
 
Improved Particle Swarm Optimization Based on Blockchain Mechanism for Flexib...
Improved Particle Swarm Optimization Based on Blockchain Mechanism for Flexib...Improved Particle Swarm Optimization Based on Blockchain Mechanism for Flexib...
Improved Particle Swarm Optimization Based on Blockchain Mechanism for Flexib...
 
Investigating the Relationship Between Teaching Performance and Research Perf...
Investigating the Relationship Between Teaching Performance and Research Perf...Investigating the Relationship Between Teaching Performance and Research Perf...
Investigating the Relationship Between Teaching Performance and Research Perf...
 

Recently uploaded

URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 

Recently uploaded (20)

URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 

Fog and Internet of Things Network Security through Blowfish Cipher

  • 1. © 2018, AJCSE. All Rights Reserved 22 RESEARCH ARTICLE Fog and Internet of Things Network Security through Blowfish Cipher B. Usharani Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation, Green Fields, Guntur, Andhra Pradesh, India Received: 02-12-2017; Revised: 25-12-2017; Accepted: 20-01-2018 ABSTRACT The data are stored and accessed in a cloud from the remote server with the help of services provided by cloud service providers. Security is a major issue as the data are transmitted to the remote server through the internet. Encryption is a better solution to secure the information when storing data at remote servers. Fog computing is evolved to overcome the security issues in cloud. Still, there are some data security issues in fog computing. An encryption algorithm plays a key role in the cloud security. Network-based intrusion prevention system is used to detect threats in real time. To provide a secure data access in cloud, advanced encryption techniques can be used for storing and retrieving data from cloud. Furthermore, proper key management techniques can be used to distribute the key to the cloud users such that only authorized persons can access the data. The Blowfish encryption can never be hacked. In this paper, Blowfish cipher technique is implemented for the security to fog of internet of things network. Key words: Blowfish, cipher techniques, fog, internet of things, network security INTRODUCTION As the number of devices connected to internet increases, there would be definitely a problem in storage and information retrieval process. Fog computing has been introduced overcome the security issues in the cloud computing. Huge amount of data produced by internet of things (IoT) devices and storing data into cloud and retrieving is highly difficult. Hence, fog has been introduced. IoThad led evolution to the fog computing because of the increased number of devices producing massive amount of data. In cloud computing, there are many security issues as of man in the middle attack and even the encryption of data is not safe method for cloud. It does not identify the difference between user and attacker. It does not concentrate on the security of the data. Cloud provides various services for storing and accessing of the data in which the major problem is that failure to provide security for the data against attackers. It is not providing any level of assurance to the user about the security of the data. Hence, developing a more secure cloud is not enough because there would Address for correspondence: B. Usharani, E-mail: ushareddy.vja@gmail.com be continuous attacks happening on the cloud, and there are chances that the data would be leaked or it might be lost forever. Hence, fog computing came into existence which is considered to be the most secure form of data storage. Hence, in this, we are trying to achieve more security at the level of fog by introducing encryption to the data using the Blowfish encryption standard algorithm technique. The paper introduces Blowfish algorithm in the fog environment, so whenever user sends data to fog for storing in the cloud, the fog will encrypt the data and send it to the cloud. Moreover, whenever user requests for the data, the encrypted data travel from cloud to fog and fog to end user, and the data will be decrypted at end user. FOG COMPUTING [FIGURE 1] In cloud computing concept, all the data produced from the users will be directly stored into the cloud and then it is analyzed with massive warehouses with analytics going on it and then decisions are made to act on data, and eventually, notifications are pushed to act on those decisions. In fog computing, the users will be notified what are the actions that are needed to be taken on the data and then analytics are applied on the received data and Available Online at www.ajcse.info Asian Journal of Computer Science Engineering 2018;3(1):22-26 ISSN 2581 – 3781
  • 2. Usharani: Security in Fog by Blowfish AJCSE/Jan-Mar-2018/Vol 3/Issue 1 23 stored it into the cloud. Fog computing is said to be an extension of the cloud but not a replacement of it. As the number of the devices connected to the internet has been increasing at rapid speed, and even advancement in the IoT has led this number to increase drastically [Figure 2]. IoT devices interact with fog nodes only when they need to offload a processing or storage request. Any other interactions would not be considered as part of the fog environment as such communications would happen as part of the network. These fog nodes interact with each other when they need to effectively manage network resources or to manage network itself. They may even operate in distributed manner to perform a specific task. To secure communications in a fog computing environment, the following communications between these devices are to be secured: 1. Communications between constrained - IoT devices and fog nodes and 2. Communications between fog nodes. Usually, an IoT device can initiate communication with any of the fog nodes in the fog network requesting for a processing or storage requirement. RELATED WORK Alrawais et al. discussed the security and privacy challenges of fog computing in IoT environments. They discussed how to use fog computing to improve the security and privacy issues in IoT environments. In addition, Hong et al. evaluated the programming model for large scale and latency sensitive IoT applications exploiting the fog computing platform. They studied the model with a camera network and connected vehicle applications and showed the efficient role of fog computing in IoT. Al Faruque and Vatanparvar proposed a software-defined network based on vehicle ad hoc networking supported by fog computing. The proposed architecture solves many issues in vehicle ad hoc networks by rising the connectivity between vehicles, vehicle-to- infrastructure, and vehicle to base station while integrating fog computing to decrease latency and provide resource utility. Koo and Hur proposed a deduplication scheme for encrypted data. CIPHER TECHNIQUES The original message is called as the plain text. The coded message is known as ciphertext. The process of converting plain text to ciphertext is known as encryption or enciphering. Cryptographic algorithms and protocols are divided into four categories: 1. Symmetric encryption 2. Asymmetric encryption 3. Data integrity algorithms 4. Authentication protocols. Network and Internet security consists of measures to deter, prevent, detect, and correct security violations that involve the transmission of information. A logical information channel is established by defining the route through the internet from source to destination by the use of communication protocols such as transmission control protocol/internet protocol by the sender and receiver. Figure 1: Fog computing architecture Figure 2: An example for IOT based on fog computing
  • 3. Usharani: Security in Fog by Blowfish AJCSE/Jan-Mar-2018/Vol 3/Issue 1 24 Encryption key is used in conjunction with the transformation to scramble the message before transmission and unscramble it on receiver side. Symmetric encryption is a form of cryptosystem in which encryption and decryption are performed using the same key. Symmetric encryption transforms plain text into ciphertext using a secret key and encryption algorithm. E(K,X) (1) Symmetric encryption of plain text X using secret key K.E. is the encryption algorithm applied on the plain text and key to transform to a ciphertext. The process of converting ciphertext to plain text is known as decryption or deciphering. In the symmetric encryption, using the same key that is used for encryption and a decryption algorithm, the plain text is recovered from the ciphertext. D(K,Y) (2) Symmetric encryption of ciphertext Y using secret key K.D. is the decryption algorithm applied on the ciphertext and key to recover original message. With the message X and the encryption key as input, the encryption algorithm forms the ciphertext Y=(Y1 ,Y2 ,Y3 ,…….Yn ). Y=E(K,X) With the cipher message Y and the decryption key as input, the decryption algorithm forms the plain text X=D(K,Y) Security of an encryption scheme depends on the length of the key. BLOWFISH CIPHER TECHNIQUE Blowfish is an encryption algorithm that can be used as a replacement for the data encryption standard (DES) or International Data Encryption Algorithm (IDEA) algorithms. It is a symmetric or conventional block cipher that uses a variable- length key, from 32 bits to 448 bits. Blowfish uses a 64-bit block size and a key length of any size from 32 bits to 448 bits. It is a 16-round Feistel cipher and uses large key-dependent S-boxes. It uses fixed S-boxes [Figure 3]. Blowfish’s key schedule starts by initializing the P-array and S-boxes with values derived from the hexadecimal digits of pi, which contain no obvious pattern. The secret key is then XORed with the P-entries in order (cycling the key if necessary). A 64-bit all-zero block is then encrypted with the algorithm as it stands. The resultant ciphertext replaces P1 and P2. The ciphertext is then encrypted again with the new subkeys, and P3 and P4 are replaced by the new ciphertext. This continues replacing the entire P-array and all the S-box entries. In all, the Blowfish encryption algorithm will run 521 times to generate all the subkeys - about 4 KB of data is processed. a. Blowfish flowchart b. Blowfish data encryption technique [Figures 4 and 5]. Blowfish uses 16 rounds. Each round consists of key-dependent permutation and a key- and data- dependent substitution. All operations are XORs and additions on 32-bit words. The only additional operations are four indexed array data lookup tables for each round. PROPOSED SYSTEM [FIGURE 6] By selecting the cloud services, the users are able to store their local data in the remote data server. The data stored in remote data center can be accessed or managed through the cloud services provided by the cloud service providers. Hence, the data stored in a remote data center for data processing should be done with utmost care. To achieve more security at the level of fog, the proposed system introduces encryption to the data using the Blowfish encryption standard algorithm technique. The proposed system introduces Blowfish algorithm in the fog environment, so whenever user sends data to fog for storing data in the cloud, the fog will encrypt the data and send it to the cloud. When user requests data, Figure 3: S-box structure
  • 4. Usharani: Security in Fog by Blowfish AJCSE/Jan-Mar-2018/Vol 3/Issue 1 25 Figure 4: Flowchart for Blowfish algorithm the encrypted data travel from cloud to fog and fog to end user, and the data will be decrypted at end user. It is very difficult to hack the Blowfish algorithm. The proposed system presents security to the network or transmission data by Blowfish algorithm in fog computing, which makes the data of the end user more secured while the data are traveling from cloud to fog or fog to cloud. CONCLUSIONS Conventional methods of encryption work on letters, so their usage has been declined for blocks. Blowfish algorithm is the replacement of DES and IDEA algorithms in the cipher techniques. The advantage of Blowfish is the variable length of the key size, i.e., from 32 to 448 bits. Blowfish is accepted as a strong encryption algorithm and fast cipher technique. The strength of the Blowfish is the generation of the subkeys, and it is very difficult to the attacker because it is very complex to identify a key, i.e., for each key generation, the encryption routine runs 522 times. In this paper, Blowfish is implemented in fog network for IoT devices. An additional layer of security is added for data retrieval; this makes the intruder very difficult to hack the data.
  • 5. Usharani: Security in Fog by Blowfish AJCSE/Jan-Mar-2018/Vol 3/Issue 1 26 3. Bhadauria R, Sanyal S. A survey on security issues in cloud computing and associated mitigation techniques. Int J Comput Appl 2012;47:47-66. 4. Mohammed EM, Ambelkadar HS. Enhanced Data Security Model on Cloud Computing, 8th International Conference on IEEE publication; 2012. p. 12-7. 5. Wang L, von Laszewski G, Kunze M, Tao J, Fu C, He X, et al. Cloud computing: A perspective study, new generation computing.Adv Distribut Inf Processing 2010;28:137-46. 6. Khairnar S, Borkar D. Fog computing: A new concept to minimize the attacks and to provide security in cloud computing environment. Int J Res Eng Technol 2014;3:124-7. 7. Stojmenovic SIT,Wen S.The Fog Computing Paradigm: Scenarios and Security Issues. Vol. 02. Federated Conference on Computer Science and Information Systems, ACSIS; 2014. 8. Dhande NS. Fog computing: Review of privacy and security issues. Int J Eng Res General Sci 2015;3:864-8. 9. Stolfo SJ, Salem MB, Keromytis AD. Fog computing: Mitigating insider data theft attacks in the cloud” IEEE; 2014. 10. NagKS,BhuvaneswariHB,NuthanAC.Implementation of Advanced Encryption Standard-192 Bit Using Multiple Keys. Vol. 1, 7. Research and Technology in the Coming Decades (CRT 2013), National Conference on Challenges; 2013. p. 27-8. 11. Sumitra G. Comparative analysis of AES and DES security algorithms. Int J Sci Res Publ 2013;3:1-5. 12. Singh S, Maakar SK, Kumar S. Enhancing the security of DES algorithm using transposition cryptography techniques. Int J Adv Res Comput Sci Soft Eng 2013;3:464-71. 13. Kruti RS, Gambhava B. New approach of data encryption standard algorithm. Int J Soft Comput Eng 2012;2:322. 14. Karthik S, Muruganandam A. Data encryption and decryption by using triple DES and performance analysis of crypto system. Int J Sci Eng Res 2014;2:24-31. 15. Sachin M, Kumar D. Implementation and analysis of AES, DES and triple DES on GSM Copyright. Int J Comput Sci Netw Security 2010;10:298-303. 16. Singh G, Supriya. A study of encryption algorithms (RSA, DES, 3DES and AES) for information security. Int J Comput Appl 2013;67:33-8. 17. Jain R, Jejurkar R, Chopade S, Vaidya S, Sanap M. AESalgorithm using 512 bit key implementation for secure communication. Res J Appl Sci Eng Technol 2014;8:2116-20. 18. Saraf KR, Jagtap VP, Mishra AK. Text and image encryption decryption using advanced encryption standard. Int J Emerg Trends Technol Comput Sci 2014;3: 118-26. 19. AdvancedEncryptionAlgorithmanditsImplementation. Available from: https://www.en.wikipedia.org/wiki/ Advanced_Encryption_Standard. [Last accessed on 2015 Jul 07]. Figure 5: Encryption procedure in Blowfish cipher algorithm Figure 6: System architecture REFERENCES 1. Shen Z, Li L, Yan F, Wu X. Cloud Computing System Based on Trusted Computing Platform, International Conference on Intelligent Computation Technology and Automation. Vol. 1; 2010. p. 942-5. 2. Pearson S, Benameur A. Privacy, Security and Trust IssuesArises from Cloud Computing, Cloud Computing Technology and Science (CloudCom), IEEE Second International Conference; 2010. p. 693-702. AQ4 Author Queries??? AQ4: Kindly cite references 1-19 in the text part