Establishment of Secure Channel for Data Communication in Cloud Computing Nishit Mishra1, Anil Saroliya2, Varun Sharma3 1,2,3 Amity School of Engineering & Technology, Amity University Rajasthan data Abstract Cloud computing is one of the hottest security. This hybrid Mechanism guarantees the confidentiality of the data in topics trending right now and when a new the clouds. technology Keywords: Cloud Computing, DES, RSA, is introduced there also challenges with it, the biggest concern is MD5, Hybrid Encryption. security. According to CSA (Cloud Security Alliance) security in cloud computing is a 1. Introduction: biggest challenge. To enhance the security of Cloud computing is the backbone for many Data communication in cloud computing, a small, medium and large scale companies and hybrid of cryptographic algorithm based on many user look for cloud services, the major DES and RSA is introduced. In this paper our concern is the security of their data in the targeted proposed approach is based on cloud. Securing data is always of vigorous hybrid cryptographic DES algorithm that will importance and because of the critical nature be used in between data transmission due to of cloud computing and the large amount of its faster encryption speed. RSA will be used complex data it carries, the necessity is even for encrypting the data as per its stronger more essential. Hereafter, concerns regarding encryption power and safe key distribution. the data security and privacy are This dual encryption ensures the safe the hurdle to the wide acceptance of cloud communication of data in clouds. Digital computing services. becoming abstract algorithm MD5 is also used. By To secure data communication in cloud comparing the Digital Signature sent by the computing a hybrid encryption algorithm sender and the result of the digital signature which is based on RSA and DES encryption of the plaintext by the receiver ensures the it also includes MD5 and digital signature for 3. HYBRID ENCRYPTION secure communication [1]. Hybrid Encryption is a technique of 2. SECURITY CONCERNS IN CLOUD COMPUTING combining two or more encryption schemes. Cloud computing is the latest trending combines the convenience of a public key topic in every field. Now a days cloud cryptosystem with the efficiency of a computing many symmetric key cryptosystem. In this, DES applications whether it is for mobile or (data encryption standards) and RSA (Rivest Desktop or in Medical field it is everywhere. Shamir Adleman) algorithms are used along In with MD5 to ensure the safe and reliable every are new integrated application in clouds are A hybrid cryptosystem is one which integrated, Technology giants like Microsoft transmission and Google Provides many services based on algorithms have their individual strengths and cloud like cloud storage, resource sharing and weaknesses and by combining the strengths on demand services are some of its examples. of these algorithms we get a hybrid which has Not only big companies but small companies are investing in cloud services because of its elasticity, pay per use, on demand service and etc. But the bigger of information. Both the advantages of both which overcomes their disadvantages [3, 4]. 4. PROPOSED ALGORITHM 4.1 Sending side question is are they secure, are the security standards enough to secure the essential Find Message Digest using Step 1 : Step 2 : information of the user. According to CSA (Cloud Security Calculate 2’s Compliment of Alliance) Data breach is the top threat in cloud computing along with Account of Message. Calculate XOR of 2’s Step 3 : Step 4 : Encrypt XOR using RSA Step 5 : Encrypt MD using DES Service Hijacking and Insecure interface or API are included [2, 5]. MD5. compliment and MD5 Send Encrypted MD and Step 6 : Encrypted Data Figure 1 presents the flow of algorithm of sender. Encrypted MD can be sent once for a session. 4.2 Receiving Side Step 1 : Decrypt MD using DES. Step 2 : Decrypt Data using RSA Step 3 : Calculate XOR of Decrypted Data and Decrypted MD Step 4 : Take 2’s Complement of resultant Figure 2 presents the flow of algorithm of receiver side. Figure2: Flow Diagram at receiver side This algorithm applied on the both sending and the receiving side and then we get the efficient method for the encryption and decryption. 4. Conclusion Today, cloud computing has become the backbone of technologies the are society. depending All the upon latest Cloud Technology as it offers low infrastructure cost and helps in reducing the investment whether its infrastructure or platform or software. Figure1: Flow Diagram at sender side Through this paper we have endeavored to Cloud Computing”, International journal present a hybrid algorithm which first establishes of Advanced Research in Computer a secure channel for data communication using Science and Software Engineering., ISSN: RSA and DES cryptographic algorithms, with the 227 128X, pp 110-114 help of generated Message Digest which will ensures that the data will be transferred reliably. 4. References [1]. L. Yu, Z. Wang and W. Wang, “The Application of Hybrid Encryption Algorithm in Software Security”, IEEE Computer Society, 762-765 , pp 10-112009 [2]. CLOUD SECURITY ALLIANCE the Notorious Nine: Cloud Computing Top Threats in 2013. [3]. W. Ren and Z. Miao, “A Hybrid Encryption Algorithm Based on DES and RSAin Bluetooth Communication”, IEEE Computer Society, 221-225 , pp 10-112009 [4]. Elichiro Fujisaki, Tatsuaki Okamoto, David Pointcheval and Jacques Stern, RSAOAEP is secure under the RSA assumption, Journal of Cryptology, 2002 [5]. K.S. Suresh and K.V. Prasad, “Security Issues and Security Algorithms in