# Introduction loud computing is the next stage in the Internet's evolution, providing the means through which everything-from computing power to computing infrastructure, applications, business processes to personal collaboration -can be delivered to you as a service wherever and whenever you need [1]. # a) Cloud Computing Deployment Models The various cloud deployment models are shown in figure 1 given below: i. Public Clouds In public cloud vendors dynamically allocate resources on a per-user basis through web applications. For example: Drop Box, SkyDrive and Google drive. Securing data is always of vital importance as shown in figure 3 and because of the critical nature of cloud computing and large amounts of complex data it carries, the need is even important. Therefore, data privacy and security are issues that need to be resolved as they are acting as a major obstacle in the adoption of cloud computing services. The major security issues with cloud are: # Privacy and Confidentiality Once the clients outsource data to the cloud there must be some assurance that data is accessible to only authorized users. The cloud user should be assured that data stored on the cloud will be confidential. # Security and Data Integrity Data security can be provided using various encryption and decryption techniques. With providing the security of the data, cloud service provider should also implement mechanism to monitor integrity of the data at the cloud. [3] II. # Problem Formulation Users who put their large data files in the cloud storage servers can relieve the burden of storage and computation. At the same time, it is critically important for users to ensure that their data are being stored correctly and safely. So, users should be equipped with their data is safe. The major concern is the security of data at rest and while moving. So to handle this problem it is required that data at both user and server end must be in encrypted form. # III. # Proposed Work Plan The two different approaches used for ensuring security in cloud are as follows: Implementation of EAP-CHAP in Cloud Computing will solve the authentication and authorization problems. [5] Table 1 # : Rijndael Encryption Code The User data is encrypted by using Rijndeal Encryption. Symmetric key is used for encryption. The Rijndeal can be implemented easily and it is one of the most secure algorithms in the world. Rijndeal implementation has 128,192or 256 bit key lengths. Size of data blocks to be encrypted with Rijndeal is always 128 bits. Initial round of Rijndeal is AddRoundKey, this is followed by four iterative round including subBytes, shiftRows, mixColumns and add round key. Rijndeal with 128 bit key length has 10 rounds,192-bit has 12 rounds and 256 bit has 14 rounds. Each round consists of the following steps. 1. Initial AddRoundKey 2. SubBytes () Transformation 3. Substitutional Box Created For Subbytes 4. MixColumns () Transformation # AddRoundKey () transformation The inverse process of encryption gives decryption text. [4] Rijndael Algorithm : Encryption/Decryption Process for Rijndael Algorithm is shown in Figure 6. The code for encryption process is given in table 1. # a. The SubBytes Step The SubByte step is a non-linear byte substitution that operates on each of the 'state' bytes independently, where a state is an intermediate cipher result. Here each byte in the state matrix is replaced with a SubByte using an 8-bit substitution box, the Rijndael S-box. # b. The ShiftRows step operates on the rows of the state; it cyclically shifts the bytes in each row by a certain offset. For AES, the first row is left unchanged. Each byte of the second row is shifted one to the left. Similarly, the third and fourth rows are shifted by offsets of two and three respectively. For blocks of sizes 128 bits and 192 bits, the shifting pattern is the same. Row n is shifted left circular by n-1 bytes. # c. The MixColumns step During this operation, each column is multiplied by the known matrix that for the 128-bit key is: The multiplication operation is defined as: multiplication by 1 means no change, multiplication by 2 means shifting to the left, and multiplication by 3 means shifting to the left and then performing xor with the initial unshifted value. After shifting, a conditional xor with 0x11B should be performed if the shifted value is larger than 0xFF. In more general sense, each column is treated as a polynomial over GF (2 8 ) and is then multiplied modulo x 4 +1 with a fixed polynomial c(x) = 0x03 ? x 3 + x 2 + x + 0x02. state with the corresponding byte of the subkey using bitwise XOR. [3] IV. # Conclusion Data security has become the vital issue of cloud computing security. From the consumers' perspective, cloud computing security concerns, especially data security and privacy protection issues, remain the primary inhibitor for adoption of cloud computing services. So in this we focused on client side security In our proposed system, only the authorized user can access the data. Even if some intruder (Unauthorized user) gets access of the data accidentally or intentionally, he will not be able to decrypt it. Also it is proposed that encryption must be done by the user to provide better security. Henceforth, security is provided using Rijndael Algorithm. # Global Journal of Computer Science and Technology 1![Figure 1 : Cloud Computing Deployment Models ii. Private Clouds Due to security and availability issues more and more companies are choosing Private Clouds. It provides more secure platform to the employees and customers of an organization. For example Banks, In banks all the employees and customers can access the bank data which is assigned to them particularly. iii. Hybrid Cloud Hybrid cloud is the combination of the Public cloud and private cloud. In this type of cloud services the internal resources, stays under the control of the customer, and external resources delivered by a cloud service provider. iv. Community Cloud The community cloud shares the infrastructure around several organizations which can be managed and hosted internally or by third party providers.[7] b) Cloud Models or Layers The various layers of cloud are shown in figure 2 given below:](image-2.png "Figure 1 :") 2![Figure 2 : Cloud Models or Layers c) Data Security Issues in the Cloud](image-3.png "Figure 2 :") 3![Figure 3 : Cloud Computing Concerns](image-4.png "Figure 3 :") 14![Figure 4 : Methodology](image-5.png "1 .Figure 4 :B") 5![Figure 5 : Implementation of CHAP in Cloud Computing Authentication of CHAP performs in three steps :-1. When client demands a service, Service Provider Authentication sends a "challenge" message to client. 2. Client responds with a value that is calculated by using one way hash function on the challenge. 3. Authenticator verifies the response value against its own calculated hash value. If the values match, the Cloud provider will give service, otherwise it should terminate the connection.](image-6.png "Figure 5 :") ![Rijndael(State, CipherKey) { KeyExpansion(CipherKey,ExpandedKey); AddRoundKey(State,ExpandedKey); For( i=1; iFinalRound(State,ExpandedKey + Nb*Nr); } And the round function is defined as: Round(State, RoundKey) { ByteSub(State); ShiftRow(State); MixColumn(State); AddRoundKey(State,RoundKey); } Volume XIII Issue III Version I](image-7.png "") ![Figure 6 : Rijndael Algorithm](image-8.png "VolumeB") © 2013 Global Journals Inc. (US) Global Journal of Computer Science and Technology * Security in Cloud Computing using File Encryption .PTejas AshishBhatt Maheta International Journal of Engineering Research and Technology (IJERT) 1 9 November 2012 * Development and Usage of Software as a Service for a Cloud and Non-Cloud based Enviroment-An Empirical Study PratiyushGuleria VikasSharma International Journal of Cloud Computing and Services Sciences(IJ-CLOSER) 2 1 February 2013 * Survey on Enhancing Cloud Data Security using EAP with Rijndael Encryption Algorithm SanjoliSingla JasmeetSingh Global Journal of Computer Science and Technology (GJCST) 13 5 2013 * Implementation of Data Security in Cloud Computing G.Jai ArulJose CSajeev International Journals of P2P Network Trends and Technology 2011 1 * Implementation of EAP with RSA for enhancing the security of cloud computing SadiaMarium QamarNazir AftabAhmed SairaAhthasham AamirMirza Mehmood International Journal of Basics and Applied Sciences 1 3 2012 * Use of Digital Signature and Rijndael encryption Algorithm to Enhanced Security of data in Cloud computing Services PrashantRewagad YogitaPawar Proceeding published in International Journal of Computer Applications (IJCA) eeding published in International Journal of Computer Applications (IJCA) 2012