A Security Mechanism for Cloud Computing Threats Mahadev Bag Rashmi Shrivas M. Tech. scholar (CSE) Asst Professor MATS University, Raipur (C.G.) INDIA Department of Computer science MATS University, Raipur (C.G.) INDIA Bagmahadev1010@gmail .com ABSTRACT Cloud computing could be a platform for increasing capabilities and developing potentialities dynamically while not employing new infrastructure, personnel, or software package systems. In Addition, cloud computing originated from an advert enterprise idea, and developed into a flourishing IT invention. Despite the plug surrounding cloud computing, customers stay reluctant to deploy their industrial enterprise into the cloud. All the same, lack of protection is that the solely major concern that hinders increased use of cloud computing. Moreover, the complexness with that cloud computing manages information secrecy, and information security makes the market hesitant concerning cloud computing. The design of cloud models threatens the security of existing technologies once deployed in an exceedingly cloud environment. Thus, users of cloud services ought to understand the dangers of uploading information into this new atmosphere. Therefore, in this paper we are proposing an different type of security mechanism for cloud computing threats so that all same problematic situations can be overcooked. By use of third party Crypto-Chest (CC) we can enhance the security over cloud. General Terms Security, cloud computing, cryptography, CC. Keywords Cloud, Crypto chest, cryptography, Chamleon Hash, Security. 1. INTRODUCTION Cloud computing is a computing paradigm which relies on resource sharing. Here the word “Cloud” is symbol for internet. Cloud computing is the delivery of computing resources or services over the internet. The services allow individuals or business groups to use resources (software and hardware) which are managed third party at different locations [1]. Cloud computing encompasses activities such as the use of social networking sites and other forms of interpersonal computing; most of the time cloud computing is concerned with accessing online software applications, data storage and processing power. It is a way to increase the capacity and/or add capabilities dynamically without having new infrastructure, training new personnel, or licensing new software. It extends Information Technology’s existing capabilities [2]. Developers with innovative ideas for Internet Shrivasrashmi20@gmail.c om services no longer need large capital outlays in hardware to deploy their services; this paradigm shift is transforming the IT industry. The operation of large scale, commodity computer datacenters was the key enabler of cloud computing, as these datacenters take advantage of economies of scale, allowing for decreases in the cost of electricity, bandwidth, operations, and hardware [3]. Based on purpose and characteristics cloud computing uses several delivery models [6]. 1.1 Deployment Tools 1.1.1 Public Cloud Cloud computing services from vendors that can be accessed across the internet or a private network using one or more data centers, shared among multiple customers with varying degrees of data privacy control. Public clouds are run by third parties, and applications from different customers are likely to be mixed together on the cloud’s servers, storage systems, and networks. Public clouds are most often hosted away from customer premises, and they provide a way to reduce customer risk and cost by providing a flexible, even temporary extension to enterprise infrastructure. 1.1.2 Private Cloud Private clouds are built for the exclusive use of one client, providing the utmost control over data, security, and quality of service. The company owns the infrastructure and has control over how applications are deployed on it. Private clouds may be deployed in an enterprise datacenter, and they may also be deployed at a co-location facility. Private clouds can be built and managed by a company’s own IT organization or by a cloud provider. In this “hosted private” model, a company such as Sun can install, configure, and operate the infrastructure to support a private cloud within a company’s enterprise datacenter. This model gives companies a high level of control over the use of cloud resources while bringing in the expertise needed to establish and operate the environment. 1.1.3 Hybrid Cloud Hybrid clouds combine both public and private cloud models. They can help to provide on-demand, externally provisioned scale. The ability to augment a private cloud with the resources of a public cloud can be used to maintain service levels in the face of rapid workload fluctuations. This is most often seen with the use of storage clouds to support Web 2.0 1 applications. A hybrid cloud also can be used to handle planned workload spikes. 1.2 Cloud computing and cryptographic Cryptography involves the conversion of clear text into an unreadable form. Cryptography is a technique frequently used to transfer contents safely by ensuring that only the intended recipient can read them. This domain spotlight provides an overview of the history of cryptography and the many complex, imaginative approaches used in contemporary enterprise encryption. Bleikertz et al. [10] proposed the secret key principles, which are applied to virtual machines on the basis of uniqueclientcontrolled CaaS architecture for cloud computing. However, these researchers emphasized the use of physical hardware security modules, and found that architecture segregates the management and storage of the keys of cloud clients as well as all cryptographic operations into a secure crypto-domain called DomC, which is tightly coupled to the workloads of clients. While, Sanyal and Iyer [11] investigated cloud security based on public key values. They discussed a secure, and efficient algorithm based on the multi-key encryption AES technique, a 128/192/256 bit cipher key used to encrypt and decrypt data. Results confirmed, that AES increases security for the cloud computing compared with RSA. But, AES can be used in virtual machines and in public or private clouds. Mao [12] noted an important problem for secure network virtualization: the negligent usage of intelligence and distributed power by hypervisors. The research discussed how hypervisors use information boxes to gain control. Therefore, he proposed network virtualization using modern technology with several useful applications, including secure multitenancy for cloud computing. Cryptography significantly affects the management of the intelligence and distributed power of hypervisors. Well-known security issues such as data loss, phishing, and botnet (running remotely on a collection of machines) pose serious threats to organization's data and software. In Cloud computing environment data protection as the most important security issue. In this issue , it concerns include the way in which data is accessed and stored , audit requirements, compliance Key guessing attack are possible, if the password is too short or poor. The key management techniques are complex to handle. No protocol are fully secured from attach, combination of technique required. 3. METHODOLOGY The design of cloud models threatens the security of existing technologies once deployed in an exceedingly cloud environment. Thus, users of cloud services ought to understand the dangers of uploading information into this new atmosphere. Therefore, we are proposing an different type of security mechanism for cloud computing threats so that all same problematic situations can be overcooked. By use of third party Crypto-Chest we can enhance the security over cloud. Fig1. Proposed Scheme 2. PROBLEM IDENTIFICATION Cloud computing has presented issues regarding data control, the effect of software systems on organic resources, and the transfer of data access control to another. Based on the above literature review, we conclude that cryptography can be used for the following: Cloud computing has presented issues regarding data control, the effect of software systems on organic resources, and the transfer of data access control to another. Based on the above literature review, we conclude that cryptography can be used for the following: Proofs of irretrievability. Private information rescue. Televise encryption. Petite signatures. Cloud computing and web services run on a network structure so they are open to network type attacks. One of these attacks is the distributed denial of service attacks. If a user could hijack a server then the hacker could stop the web services from functioning and demand a ransom to put the services back online. The security issue has played the most important role in hindering Cloud computing. Without doubt, putting your data, running your software at someone else's hard disk using someone else's CPU appears daunting to many. In third party Crypto-chest we will use ID-based hashing scheme. IDbased cryptography is an alternate form of publickey cryptography that does not use certification authorities or certificates. Instead, an ID-based scheme defines “identity strings”, which are nothing more than a special string format to describe real entities (persons or machines). An identity string could be an e-mail address, a URL, a person’s address, or any other unambiguous reference. The public keys are derived from these identity strings by means of a public algorithm. ID-based Chameleon Hashing We assume that all system users are identifiable by a bit-string easily derivable from public knowledge about the individual. For instance, it could be the user’s e-mail address, augmented by some information such as an expiration-date. We call such a string an identity string. Formally, an ID-based chameleon hashing scheme is defined by a family of efficiently computable algorithms: Setup: A trusted party, the key escrow, runs this efficient, probabilistic algorithm to generate a pair of keys SK and PK defining the scheme. It publishes PK and keeps SK secret. The input to this algorithm is a security parameter(s). Extract: An efficient, deterministic algorithm that, on inputs SK and an identity string S, outputs the trapdoor information B associated to the identity. Hash: An efficient, probabilistic 2 algorithm that, on inputs PK, an identity string S, and a message m, outputs a hash value h. Forge: An efficient algorithm that, on inputs PK, an identity string S, the trapdoor information B associated with S (i.e., the output of Extract(SK, S)), a message m0, and a hash value h of a message m, outputs a sequence of random bits that correspond to a valid computation of Hash(PK, S,m0) yielding the target value h. The setup algorithm is similar to an RSA key generation step. The trusted party T generates two prime numbers p and q in the set {2_−1, . . . , 2_ − 1}. Let n = pq. The bit-length of n, `(n), is no less than 2_. Let C : {0, 1}_ ! {0, · · · , 22_−1} be a secure deterministic hash-and-encode scheme mapping arbitrary bit-strings to integers less than n. For instance, it is possible to use the deterministic version of EMSA-PSS encoding defined in [11, 12]. T then generates a random prime integer v s.t. v > 2_ , and such that GCD(v, (p − 1)(q − 1)) = 1, i.e., v is relatively prime to the order _(n) of the multiplicative residues modulo n. Applying the extended Euclidean algorithm for the GCD, T computes w and z such that wv + z(p − 1)(q − 1) = 1. T’s public key is (n, v). Its secret key is (p, q,w). We can now describe the extraction algorithm. Let S be the identity string associated to some party. First we apply the deterministic hash-and-encode scheme to obtain the element J = C(S) in Zn. The secret key is extracted as B = Jw mod n. Notice that being able to compute B from S should be infeasible. In particular, if C is chosen as the EMSA-PSS encoding, then B is a secure RSA signature on the string S, under the public key (n, v). The Hash(·) algorithm is: Hash(S, m, r) = JH(m)rv mod n, where, again, H(·) is the secure hash function, and J = C(S). The Forge algorithm is: Forge(S,B, m, r, h,m0) = r0 = rBH(m)−H(m0) mod n. 5. REFERENCES [1] Heena I. Syed and Naghma A. Baig, “Survey On Cloud Computing”, International Journal of Emerging Technology and Advanced Engineering, Volume 3, Issue 4, pages 308-312, April 2013. [2] Kuyoro S. O., Ibikunle F. and Awodele O., "Cloud Computing Security Issues and Challenges", International Journal of Computer Networks, Volume 3, Issue 5, pages 247-255, 2011. [3] AMIT GOYAL and SARA DADIZADEH, "A Survey on Cloud Computing", University of British Columbia, Technical Report for CS 508, pages 1-14, December 2009. [4] Shilpashree Srinivasamurthy and David Q. Liu, "Survey on Cloud Computing Security". [5] S.Sathyavani and T.P.Senthilkumar, "Survey on Cloud Computing", International Journal of Computer Trends and Technology, volume 4, Issue 9, pages 3116-3120, Sep 2013. [6] Jason Carolan and Steve Gaede, "Introduction to Cloud Computing architecture", Sun Microsystems, Inc, 1st Edition, June 2009. [7] Wayne Jansen and Timothy Grance, "Guidelines on Security and Privacy in Public Cloud Computing", National Institute of Standards and Technology Draft Special Publication 800-144, January 2011. [8] 4. CONCLUSION The design of cloud models threatens the security of existing technologies once deployed in an exceedingly cloud environment. Thus, users of cloud services ought to understand the dangers of uploading information into this new atmosphere. By use of third party Crypto-Chest we can enhance the security over cloud. Following are the benefits of using Third party Crypto-Chest: Non-repudiation: The user cannot deny legitimate signature claims. Practical and efficient: The algorithms have costs comparable with those of standard signature schemes. S. Bleikertz, S. Bugiel, H. Ideler, S. Nürnberger, and A.-R. Sadeghi, "Client-controlled Cryptography-as-a-Service in the Cloud." [9] S. Sanyal, and P. P. Iyer, “Cloud Computing--An Approach with Modern Cryptography,” arXiv preprint arXiv:1303.1048, 2013. [10] W. Mao, "The role and effectiveness of cryptography in network virtualization: a position paper." pp. 179-182. [11] K. Rauber, “CLOUD CRYPTOGRAPHY,” International Journal of Pure and Applied Mathematics, vol. 85, no. 1, pp. 1-11, 2013. Semantic security: The hash value does not reveal information about the message signed. Message hiding: No one does not have to reveal the original message to deny the validity of a forgery. Lightweight key distribution/refreshment: Public keys do not need to be distributed after a refreshment. Secret key retrieval is optional for recipients. 3