{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T20:42:54Z","timestamp":1730320974684,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,12,29]],"date-time":"2018-12-29T00:00:00Z","timestamp":1546041600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,12,29]]},"DOI":"10.1145\/3301551.3301597","type":"proceedings-article","created":{"date-parts":[[2019,3,11]],"date-time":"2019-03-11T12:33:01Z","timestamp":1552307581000},"page":"157-162","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Using a Modified Approach of Blowfish Algorithm for Data Security in Cloud Computing"],"prefix":"10.1145","author":[{"given":"Reynaldo R.","family":"Corpuz","sequence":"first","affiliation":[{"name":"Technological Institute of the Philippines, Quezon City, Philippines"}]},{"given":"Bobby D.","family":"Gerardo","sequence":"additional","affiliation":[{"name":"West Visayas State University, Lapaz, Iloilo City, Philippines"}]},{"given":"Ruji P.","family":"Medina","sequence":"additional","affiliation":[{"name":"Technological Institute of the Philippines, Quezon City, Philippines"}]}],"member":"320","published-online":{"date-parts":[[2018,12,29]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"B. Joshi Karuna P Theofanos Mary And Stanton \"Framework for Cloud Usability NIST Special Publication 500-316 Framework for Cloud Usability \" pp. 1--18 2015. B. Joshi Karuna P Theofanos Mary And Stanton \"Framework for Cloud Usability NIST Special Publication 500-316 Framework for Cloud Usability \" pp. 1--18 2015."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.186"},{"key":"e_1_3_2_1_3_1","volume-title":"Security Challenges in Cloud Computing","author":"Ertaul L.","year":"2010","unstructured":"L. Ertaul , S. Singhal , and G. Saldamli , \" Security Challenges in Cloud Computing ,\" 2010 . L. Ertaul, S. Singhal, and G. Saldamli, \"Security Challenges in Cloud Computing,\" 2010."},{"key":"e_1_3_2_1_4_1","first-page":"500","volume-title":"no. 2","author":"Ramaporkalai T.","year":"2017","unstructured":"T. Ramaporkalai , \" Security Algorithms in Cloud Computing SECURITY ISSUES OF CLOUD,\" vol. 5 , no. 2 , pp. 500 -- 503 , 2017 . T. Ramaporkalai, \"Security Algorithms in Cloud Computing SECURITY ISSUES OF CLOUD,\" vol. 5, no. 2, pp. 500--503, 2017."},{"key":"e_1_3_2_1_5_1","volume-title":"Minimization of Security Issues in Cloud Computing","author":"Ahmed R.","year":"2017","unstructured":"R. Ahmed and M. L. Ali , \" Minimization of Security Issues in Cloud Computing ,\" 2017 . R. Ahmed and M. L. Ali, \"Minimization of Security Issues in Cloud Computing,\" 2017."},{"key":"e_1_3_2_1_6_1","volume-title":"Cloud computing security issues and challenges,\" no","author":"Paper C.","year":"2010","unstructured":"C. Paper and K. P. Siemens , \" Cloud computing security issues and challenges,\" no . June 2010 . C. Paper and K. P. Siemens, \"Cloud computing security issues and challenges,\" no. June 2010."},{"key":"e_1_3_2_1_7_1","first-page":"1227","volume-title":"2014 Int. Conf. Adv. Comput. Commun. Informatics, ICACCI 2014","author":"Kaur R.","year":"2014","unstructured":"R. Kaur and R. P. Singh , \" Enhanced cloud computing security and integrity verification via novel encryption techniques,\" Proc . 2014 Int. Conf. Adv. Comput. Commun. Informatics, ICACCI 2014 , pp. 1227 -- 1233 , 2014 . R. Kaur and R. P. Singh, \"Enhanced cloud computing security and integrity verification via novel encryption techniques,\" Proc. 2014 Int. Conf. Adv. Comput. Commun. Informatics, ICACCI 2014, pp. 1227--1233, 2014."},{"volume-title":"Data security, & Security Issues,\"","author":"Shashi M.","key":"e_1_3_2_1_8_1","unstructured":"M. Shashi , \" Cloud Computing Models : Background , Data security, & Security Issues,\" vol. 2 , no. 2, pp. 1--6, 2017. M. Shashi, \"Cloud Computing Models: Background, Data security, & Security Issues,\" vol. 2, no. 2, pp. 1--6, 2017."},{"key":"e_1_3_2_1_9_1","first-page":"828","volume-title":"no. 6","author":"Kaur H.","year":"2017","unstructured":"H. Kaur , \" A Novel Technique of Data Security in Cloud Computing based on Blowfish with the MD5 method,\" vol. 3 , no. 6 , pp. 828 -- 837 , 2017 . H. Kaur, \"A Novel Technique of Data Security in Cloud Computing based on Blowfish with the MD5 method,\" vol. 3, no. 6, pp. 828--837, 2017."},{"issue":"10","key":"e_1_3_2_1_10_1","first-page":"353","article-title":"Cloud security algorithms","volume":"9","author":"Pansotra A.","year":"2015","unstructured":"A. Pansotra and S. P. Singh , \" Cloud security algorithms ,\" Int. J. Secur. Its Appl. , vol. 9 , no. 10 , pp. 353 -- 360 , 2015 . A. Pansotra and S. P. Singh, \"Cloud security algorithms,\" Int. J. Secur. Its Appl., vol. 9, no. 10, pp. 353--360, 2015.","journal-title":"Int. J. Secur. Its Appl."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3301326.3301331"},{"issue":"4","key":"e_1_3_2_1_12_1","first-page":"26433","article-title":"Comparative study of different cryptographic algorithms","volume":"8","author":"Vanitha M.","year":"2016","unstructured":"M. Vanitha and R. Mangayarkarasi , \" Comparative study of different cryptographic algorithms ,\" Int. J. Pharm. Technol. , vol. 8 , no. 4 , pp. 26433 -- 26438 , 2016 . M. Vanitha and R. Mangayarkarasi, \"Comparative study of different cryptographic algorithms,\" Int. J. Pharm. Technol., vol. 8, no. 4, pp. 26433--26438, 2016.","journal-title":"Int. J. Pharm. Technol."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.708447"},{"volume-title":"High Throughput Parallel Implementation of Blowfish Algorithm","author":"Oukili S.","key":"e_1_3_2_1_14_1","unstructured":"S. Oukili and S. Bri , \" High Throughput Parallel Implementation of Blowfish Algorithm ,\" vol. 2092 , no. 6, pp. 2087--2092, 2016. S. Oukili and S. Bri, \"High Throughput Parallel Implementation of Blowfish Algorithm,\" vol. 2092, no. 6, pp. 2087--2092, 2016."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.02.108"},{"key":"e_1_3_2_1_16_1","first-page":"191","volume-title":"Fast Softw. Encryption. Lect. Notes Comput. Sci. Cambridge Secur. Work. Proc. (December 1993","volume":"809","author":"Schneier B.","year":"1993","unstructured":"B. Schneier , \" Description of a New Variable-Length Key , 64- Bit Block Cipher (Blowfish),\" Fast Softw. Encryption. Lect. Notes Comput. Sci. Cambridge Secur. Work. Proc. (December 1993 ), vol. 809 , no. December 1993 , pp. 191 -- 204 , 1994. B. Schneier, \"Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish),\" Fast Softw. Encryption. Lect. Notes Comput. Sci. Cambridge Secur. Work. Proc. (December 1993), vol. 809, no. December 1993, pp. 191--204, 1994."},{"key":"e_1_3_2_1_17_1","first-page":"12","volume-title":"Conf. Informatics Appl. ICIA 2013","author":"Alabaichi A.","year":"2013","unstructured":"A. Alabaichi , F. Ahmad , and R. Mahmod , \" Security analysis of blowfish algorithm,\" 2013 2nd Int . Conf. Informatics Appl. ICIA 2013 , pp. 12 -- 18 , 2013 . A. Alabaichi, F. Ahmad, and R. Mahmod, \"Security analysis of blowfish algorithm,\" 2013 2nd Int. Conf. Informatics Appl. ICIA 2013, pp. 12--18, 2013."},{"key":"e_1_3_2_1_18_1","first-page":"1","volume-title":"10 Annu. Int. Conf. Proceedings\/TENCON","author":"Nie T.","year":"2009","unstructured":"T. Nie and T. Zhang , \" A study of DES and Blowfish encryption algorithm,\" IEEE Reg . 10 Annu. Int. Conf. Proceedings\/TENCON , pp. 1 -- 4 , 2009 . T. Nie and T. Zhang, \"A study of DES and Blowfish encryption algorithm,\" IEEE Reg. 10 Annu. Int. Conf. Proceedings\/TENCON, pp. 1--4, 2009."},{"key":"e_1_3_2_1_19_1","first-page":"1995","article-title":"Academic: The Blowfish Encryption Algorithm-One Year Later - Schneier on Security","author":"Schneier B.","year":"1995","unstructured":"B. Schneier , \" Academic: The Blowfish Encryption Algorithm-One Year Later - Schneier on Security ,\" Dr. Dobb's Journal , Sept. 1995 ., 1995 . B. Schneier, \"Academic: The Blowfish Encryption Algorithm-One Year Later - Schneier on Security,\" Dr. Dobb's Journal, Sept. 1995., 1995.","journal-title":"Dr. Dobb's Journal"},{"key":"e_1_3_2_1_20_1","unstructured":"S. Vaudenay and E. N. S. Dmi \"On the Weak Keys of Blowfish.\" S. Vaudenay and E. N. S. Dmi \"On the Weak Keys of Blowfish.\""},{"key":"e_1_3_2_1_21_1","unstructured":"V. Rijmen \"Cryptanalysis and design of iterated block ciphers.... - Google Scholar \" 1997. V. Rijmen \"Cryptanalysis and design of iterated block ciphers.... - Google Scholar \" 1997."},{"key":"e_1_3_2_1_22_1","first-page":"1463","volume-title":"Symp. Ind. Electron.","author":"Zhang R.","year":"2008","unstructured":"R. Zhang and L. Chen , \" A block cipher using key-dependent S-box and P-boxes,\" IEEE Int . Symp. Ind. Electron. , pp. 1463 -- 1468 , 2008 . R. Zhang and L. Chen, \"A block cipher using key-dependent S-box and P-boxes,\" IEEE Int. Symp. Ind. Electron., pp. 1463--1468, 2008."},{"key":"e_1_3_2_1_23_1","first-page":"74","article-title":"Generating Pseudorandom S-Boxes - a Method of Improving the Security of Cryptosystems Based on Block Ciphers","volume":"2","author":"Mroczkowski P.","year":"2009","unstructured":"P. Mroczkowski , \" Generating Pseudorandom S-Boxes - a Method of Improving the Security of Cryptosystems Based on Block Ciphers ,\" J. Telecommun. Inf. Technol. , vol. Nr 2 , pp. 74 -- 79 , 2009 . P. Mroczkowski, \"Generating Pseudorandom S-Boxes - a Method of Improving the Security of Cryptosystems Based on Block Ciphers,\" J. Telecommun. Inf. Technol., vol. Nr 2, pp. 74--79, 2009.","journal-title":"J. Telecommun. Inf. Technol."},{"issue":"1","key":"e_1_3_2_1_24_1","first-page":"67","article-title":"Evaluation of Key-Dependent S-Box Based Data Security Algorithm using Hamming Distance and Balanced Output","volume":"5","author":"Maram B. K.","year":"2016","unstructured":"B. K. Maram and J. M. Gnanasekar , \" Evaluation of Key-Dependent S-Box Based Data Security Algorithm using Hamming Distance and Balanced Output ,\" Journal , vol. 5 , no. 1 , pp. 67 -- 75 , 2016 . B. K. Maram and J. M. Gnanasekar, \"Evaluation of Key-Dependent S-Box Based Data Security Algorithm using Hamming Distance and Balanced Output,\" Journal, vol. 5, no. 1, pp. 67--75, 2016.","journal-title":"Journal"},{"key":"e_1_3_2_1_25_1","article-title":"Description of a new Variable-Length Key, 64-Bit Block Cipher (Blowfish)","author":"Schneier B.","year":"1994","unstructured":"B. Schneier , \" Description of a new Variable-Length Key, 64-Bit Block Cipher (Blowfish) ,\" Dr. Dobb's Journal , April 1994, 1994 . B. Schneier, \"Description of a new Variable-Length Key, 64-Bit Block Cipher (Blowfish),\" Dr. Dobb's Journal, April 1994, 1994.","journal-title":"Dr. Dobb's Journal"},{"issue":"1","key":"e_1_3_2_1_26_1","first-page":"150","article-title":"A Novel Fast Image Encryption Scheme Based on 3D Chaotic Baker Maps","volume":"3","author":"Ahmed H. E. H. D. H.","year":"2013","unstructured":"H. E. H. D. H. Ahmed ., \" A Novel Fast Image Encryption Scheme Based on 3D Chaotic Baker Maps ,\" Int. J. Sci. Eng. Res. , vol. 3 , no. 1 , pp. 150 -- 154 , 2013 . H. E. H. D. H. Ahmed et al., \"A Novel Fast Image Encryption Scheme Based on 3D Chaotic Baker Maps,\" Int. J. Sci. Eng. Res., vol. 3, no. 1, pp. 150--154, 2013.","journal-title":"Int. J. Sci. Eng. Res."},{"key":"e_1_3_2_1_27_1","first-page":"540","article-title":"A Simple and Efficient Key-Dependent S-Box Design Using Fisher-Yates Shuffle Technique","volume":"420","author":"Ahmad M.","year":"2014","unstructured":"M. Ahmad , P. M. Khan , and M. Z. Ansari , \" A Simple and Efficient Key-Dependent S-Box Design Using Fisher-Yates Shuffle Technique ,\" Commun. Comput. Inf. Sci. , vol. 420 CCIS, pp. 540 -- 550 , 2014 . M. Ahmad, P. M. Khan, and M. Z. Ansari, \"A Simple and Efficient Key-Dependent S-Box Design Using Fisher-Yates Shuffle Technique,\" Commun. Comput. Inf. Sci., vol. 420 CCIS, pp. 540--550, 2014.","journal-title":"Commun. Comput. Inf. Sci."},{"key":"e_1_3_2_1_28_1","unstructured":"M. Eberl \"The Fisher-Yates shuffle \" pp. 1--9 2018. M. Eberl \"The Fisher-Yates shuffle \" pp. 1--9 2018."}],"event":{"name":"ICIT 2018: IoT and Smart City","sponsor":["The Hong Kong Polytechnic The Hong Kong Polytechnic University","TU Tianjin University"],"location":"Hong Kong Hong Kong","acronym":"ICIT 2018"},"container-title":["Proceedings of the 6th International Conference on Information Technology: IoT and Smart City"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3301551.3301597","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,6]],"date-time":"2023-04-06T16:24:55Z","timestamp":1680798295000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3301551.3301597"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,29]]},"references-count":28,"alternative-id":["10.1145\/3301551.3301597","10.1145\/3301551"],"URL":"https:\/\/doi.org\/10.1145\/3301551.3301597","relation":{},"subject":[],"published":{"date-parts":[[2018,12,29]]},"assertion":[{"value":"2018-12-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}