[Isiaka et. al., Vol.6 (Iss.12): December 2019] ISSN: 2454-1907 DOI: 10.5281/zenodo.3595252 Http://www.ijetmr.com©International Journal of Engineering Technologies and Management Research [29] HYBRIDIZATION OF RSA AND BLOWFISH CRYPTOGRAPHY ALGORITHMS FOR DATA SECURITY ON CLOUD STORAGE Isiaka O.S. 1 , Murtala K. 2 , Ibraheem A.F. 3 , Bolaji-Adetoro D.F. 4 1, 2, 4 Department of Computer Science, Institute of Information and Communication Technology, Kwara State Polytechnic, Ilorin-Nigeria 3 Department of Mass Communication, Institute of Information and Communication Technology, Kwara State Polytechnic, Ilorin-Nigeria Abstract: Security is provided for data according to the requirements of client. Cloud computing provides different types of services. Apart from the advantages of cloud, it has many security related issues. The topmost challenge in cloud is data security. There are more possibilities that the data are accessed by the other users of cloud storage. Data security must be addressed in the cloud storage. Cryptography is the most known technique for securing the data by encryption. It is necessary to propose encryption techniques which are suitable for cloud storage. Every cloud computing provides the different level of security. The aim of this study is to improve on the security of data or file stored on cloud storage using hybrid cryptographic algorithms for encryption. The algorithms are designed in such a way that one authenticates the authorized user and the other provides confidentiality and security for data stored on cloud. Keywords: Cryptography; Blowfish Algorithm; Cloud Storage; Data Security; Symmetric Algorithm; Asymmetric Algorithm. Cite This Article: Isiaka O.S., Murtala K., Ibraheem A.F., and Bolaji-Adetoro D.F.. (2019). HYBRIDIZATION OF RSA AND BLOWFISH CRYPTOGRAPHY ALGORITHMS FOR DATA SECURITY ON CLOUD STORAGE.International Journal of Engineering Technologies and Management Research, 6(12), 29-34. DOI: 10.5281/zenodo.3595252. 1. Introduction Recently, cloud computing is used to generate large amount of data in daily life to store huge amount of data in different fields. Cloud computing provides different types of services to the user. The concerns of cloud computing are data security, authentication, integrity and confidentiality (Rimal et al., 2009). In order to provide the solution to these security issues on cloud storage, different algorithms and techniques have been introduced by different researchers but all with their own merits and demerits (Swathi and Bhaludra, 2017). Cloud computing storage is used to store data and the user can access that data any time at any place. Nowadays large amount of data is stored on cloud, but majority are not secure, which gives room for unauthorized access. To provide the security to data on cloud, cryptography algorithms are most ideal (Mukhopadhyay, 2013).Cryptography is a process in which data are