International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878, Volume-8 Issue-2, July 2019 4152 Published By: Blue Eyes Intelligence Engineering & Sciences Publication Retrieval Number: B3171078219/19©BEIESP DOI: 10.35940/ijrte.B3171.078219 Abstract: Many companies which essentially required cloud computing services are still in ambivalence whether to adopt it or not. In this research paper an attention has been drawn on security of storage as a Service which is an integral part of Infrastructure as a Service which provide famous CSP, AWS. Whenever someone rent the storage from the cloud service provider, chances of its compromising can take place. Therefore it is intelligence to encrypt the data before uploading it to the cloud and more intelligently divide the data into fragments and encrypt these fragments separately and then upload on cloud. Suppose that if this data is divided into n fragments then n algorithm are required to encrypt these fragments or use single one algorithm and change its key n times otherwise if only one key will be used and someone steal this key then all fragments will be decrypted with the same key. Many algorithms like DES, AES, RSA, Elgamal and Blow Fish are there but they all are static in nature and one more weakness of these algorithms is that size of encrypted file increased. While some researchers used these algorithms in combination and some used double encryption, nevertheless nature remains static and decrypted file size increase rapidly. Now, there is a requirement to design a data sensitive algorithm which could sense data and produce different key for different data automatically. In this paper Two Pass Multidimensional Key Generation and Encryption Algorithm has been proposed which will sort the above problem. Another beauty of this algorithm is that it checks the integrity of the documents while decrypting. Out of millions or billions of characters if only one character or word is altered or removed then this algorithm will show that documents integrity has been violated. Index Terms: Cloud Computing; Two Pass Algorithm; Data Sensitive; Storage Security; User Independent. I. INTRODUCTION Cloud Computing is a technology for performing computation through Internet on remote location. Cloud computing was first coined by Prof. John McCarthy in 1960. Initially cloud computing was growing rapidly and its field was spreading fast. Large scale companies were adopting the cloud computing happily. As soon as the news of data leakage and hacking from cloud came, it leveraged a bad impact in users’ mind. Cloud Computing is a very popular and versatile environment to support commercial business industries. It is rich with a no. of definitions. According to Prof. John McCarthy “If computers of the kind I have advocated become the computers of the future, computing may someday be organized as a public utility just as the telephone system is a public utility. The computer utility could become the basis of a new and important industry”[7]. Revised Manuscript Received on July 15, 2019. Mohd. Tajammul, Department of Computer Science, Jamia Millia Islamia, New Delhi, India. Rafat Parveen, Department of Computer Science, Jamia Millia Islamia, New Delhi, India. The National Institute of Standards and Technology (NIST) define cloud computing as “A model for enabling convenient, on demand network access to a shared pool of congurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models” [18, 21]. A. Deployment models of cloud computing Public cloud-: This is one of the types of cloud deployment model in which everybody is allowed to avail services. It is highly suggested to go for this cloud model if data or computation is not highly sensitive or secure [7]. Private cloud-: This is one of the types of cloud deployment model in which everybody is not allowed to avail services. It is highly suggested to go for this cloud model if data or computation is highly sensitive or secure. It is available for any particular company, organization or an individual [19, 23]. Community cloud-: This is one of the types of cloud deployment model in which every body from a community or from a particular group only is allowed to avail services. It is highly suggested to go for this cloud model if data or computation is of middle level sensitive or secure [19, 22]. Hybrid cloud-: This is one of the types of cloud deployment model in which everybody is allowed to avail services. It is combination of any of the above two cloud models [7, 22, 23]. B. Service Models of cloud computing Software as a Service (SaaS)-: Under this service, software is provided to the client on which he or she can perform operations for instance Gmail. Some well known SaaS providers are SalesForce.com, Microsoft, IBM and Oracle, NetSuite [18]. Platform as a Service (PaaS)-: Under this service, a platform is given to the client, on which client can develop his or her applications. Some well known PaaS providers are Microsoft Azure, GAE [18]. Infrastructure as a Service (IaaS)-: An infrastructure like CPU or storage is given to the client, on which he or she can perform computation or upload data for future use. Popular IaaS providers are Amazon Web Services Joyent, Flexiscale, GoGrid [18]. Mohd. Tajammul, Rafat Parveen Two Pass Multidimensional Key Generation and Encryption Algorithm for Data Storage Security in Cloud Computing