Research Article

An Implementation of Modified Blowfish Technique with Honey Bee Behavior Optimization for Load Balancing in Cloud System Environment

Figure 2

Encryption data flow of the Modified-Blowfish techniques.