Council for Innovative Research International Journal of Computers & Technology www.cirworld.com Volume 4 No. 1, Jan-Feb, 2013 ISSN 2277-3061 111-113 www.ijctonline.com New Approach for Managing Keys in Cloud & Use Cases for Cloud Computing Sarvesh Kumar, Anupam Shukla 1 , Ankit Sharma, Kalimullah Lone (sarvi899, anupam.yoopi, ankitsharma.com, kalimullahlone)@gmail.com Department of Computer Science and Engineering Lovely Professional University, Punjab 1 Lecturer, D G Tatkare Mahavidyalaya, Mumbai Abstract: Now a day’s cloud computing is best innovative technology in the field of IT. In its broadest usage, the term cloud computing refers to the delivery of IT resources over the internet as opposed to hosting and operating these resources locally, such as a college or university network. These resources can include application and services as well as infrastructure and services over the network. Any organization can purchase these resources on as needed basis and avoid the capital expenditure cost of software and hardware. Security is major problem in cloud computing, thus key distribution is important thing for managing security in cloud computing. In this paper we derived a proposed algorithms for managing keys in the cloud and also discuss uses cases for cloud computing. Key words: cloud computing, IaaS, SaaS ,Paas Introduction: Cloud computing is just internet based computing. If we have an internet connection, then we can now access the features of cloud computing. If we have Gmail account, it means we are using cloud. First we do not download Gmail account on my hard drive of my computer, only we see and leave it. Then point arises here that where our Gmail files is stored or Face book account where we can upload picture, videos and YouTube uploading video, where it is stored. It is stored on clouds. If we leave anything on web so we uses cloud computing. We can see again Gmail files by internet technology. Some years ago, software installed on your computer or on your mobile, and then we can use this software on your computer on your mobile. But using of cloud computing, we can use these types of software without installation or without download from your computer or your mobile or your tablets. We can use it, we can change it from any machine like Tablet, computer or mobile E.g. Google Doc. All the world companies want to use the power and benefits of cloud computing. Amazon allows to his customers to put their list of favourite songs on his clouds. Apple is making own cloud called I Cloud. We can also find use of free cloud computing services e.g. Google doc, icloud.We will not pay for using this cloud service. As the many software runs on webs, then we going in clouds depend upon internet. In this paper we will discuss about challenges and use cases of cloud computing and searchable solution for managing security in cloud computing. Basic terminology of cloud computing: there are some basic terms related to cloud computing. 1. Service level agreement: it is a contract between consumer and provider that specifies consumer requirements and providers commitment. 2. Federation: it is the act of combining data across multiple systems that is done by either cloud provider or cloud broker. 3. Broker: a broker has no cloud resources but matches between consumers and providers resources. 4. Multi-Tenancy: it is the property of applications or data from different enterprises hosted on same physical hardware. 5. Cloud brusting: it is a techniques used by hybrid clouds to provide additional resources to private cloud as needed basis. If the private cloud has no need of resources then hybrid cloud is not used. 6. Policy: general term for operating a procedure ie. A security policy means that it must specify that all requests to a particular cloud services must be in encrypted mode. 7. Virtual machine: A file typically called an image that when executed looks like user like an actual machine. Challenges: