Cloud Computing
Author: Monika Agrawal, January 12, 2015 – Posted in: Cloud Computing – Tags:

cloud-computing-2

Cloud computing has been envisioned as the next generation architecture of IT Enterprise . In contrast with the traditional solutions, where the IT services are under proper physical, logical, and personnel application controls. Cloud computing moves the applications software and databases to the large data centers, where the management and maintenance of data and record is said to be trustworthy. This unique attribute however poses a new security threats which have not been well understood. In this project we mainly focuses the Cloud data storage security which has always been the important aspect of Quality Of Services(QOS). The accurate and real time prediction of the network security situation is the premise and basis of prevention of the intrusion detection and the attacks in the large scale networks. The security for the Cloud computing is implemented by using the Genetic Algorithms(GA) which is the class of optimizing algorithms. It models the simplified version of genetic processes like crossover and mutations. Genetic Algorithm also focuses the secure password authenticated key establishment with two party encrypted key exchange. Extensive security and performance analysis shows that the proposed scheme is highly efficient and malicious data modification attack and other attacks.

INTRODUCTION 

Several trends are opening up for the era of the cloud computing which is an Internet based development and use of computer technology. The ever cheaper and more powerful processors together with the Software as a Service(Saas) computing architecture, are transforming the Data Centers into pools of computing service on a huge scale. Moving data into the cloud offers great convenience to users since they don’t have to care about the complexities of direct hardware management. The pioneer of Cloud Computing vendors, Amazon simple storage service and Amazon Elastic Compute Cloud (EC2) are both well known examples. While these Internet – based online services do provide huge amounts of storage space and customizable computing resources, this computing platform shift, however, is eliminating the responsibility of local machines for data maintenance at the same time. data security which has always been an important aspect of QOS ,Cloud Computing inevitably poses new challenging security threats for number of reasons.

Considering the various kinds of data for each user stored in the cloud becomes even more challenging task. Cloud computing is powered by Cloud Administrator (CA),Data Center(DC),Library and finally the users or Clients who uses the SaaS running in a simultaneous cooperated and distributed manner Individual user’s data is redundantly stored in the multiple physical locations to further reduce the data integrity threats.

The password-based mechanism is useful for user authentication in computer network systems. It allows users to be authenticated by remote computer systems via easily rememberable passwords. Designing a secure password based system is a precise task, brings out the Encrypted Key Exchange(EKE), two-party password-based authenticated key establishment have been proposed to improve security and performance. Kerberos system is the first solution to password authenticated key establishment in a cross-realm setting but one of the most serious problem in Kerberos system is the dictionary attack.

After a long analysis, Genetic algorithm which is the class of optimization algorithm is chosen and is implemented for the encryption/decryption operation and implemented as a computer simulation in which plain text of binary representations is assigned to each special symbol stored inside a symbol table. In genetic algorithm the solutions are represented in the text called Cipher Text, the evolution of the algorithm usually starts from the plain text.