International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 3 Issue: 3 1577 - 1581 _______________________________________________________________________________________________ 1577 IJRITCC | March 2015, Available @ http://www.ijritcc.org _______________________________________________________________________________________ Secured Data Outsourcing in Cloud Computing Nivedita B. Patil P.G. Student, Department of Computer Science, Astral Institute of Technology & Research, Indore, India. nivedita.patil04@gmail.com Prof. Abhay Pawar Assistant Professor, Department of Computer Science, Astral Institute of Technology & Research, Indore, India. abhay655@gmail.com Rohit P. Vibhandik P.G. Student, Department of Computer Science, B. M. College of Technology, Indore, India. vibhandik.rohit@gmail.com Abstract— Cloud computing is a popular technology in the IT world. After internet, it is the biggest thing for IT world. Cloud computing uses the Internet for performing the task on the computer and it is the next- generation architecture of IT Industry. It is related to different technologies and the convergence of various technologies has emerged to be called as cloud computing. It places the application software and databases to the huge data centers, where the supervision of the data and services may not be fully trusted. This unique attribute poses many new security challenges which have not been well understood. In this paper, we develop system which allows customer to use cloud server with various profits and strong securities. So when customer stores his sensitive data on cloud server he should not worry about securities, we also protect customer’s account from malicious behaviors by verifying the result. This result verification mechanism is highly efficient for both cloud server and cloud customer. Covering security analysis and experiment results shows the immediate practicability of our mechanism design. Keyword-Cloud computing, security,saas, multitenant. __________________________________________________*****_________________________________________________ I. INTRODUCTION Cloud computing is the use of computational resources such as hardware and software that are delivered as a service over an internet. The name cloud computing comes from the use of a cloud-shaped symbol to show the complex infrastructure it contains in system diagrams. Cloud computing trusts remote services with an user's data, software and computation. Cloud computing is a common term for anything that involves delivering hosted services over an Internet. A cloud service has three distinct characteristics that differentiate it from traditional hosting. It provides on demand access, typically by the minute or the hour; it is expandable - a user can have as much or as little of a service as he wants; and the service is fully managed by the service provider. A cloud may be private or public. A public cloud allows services to everyone on the Internet. At Present, Amazon Web Services is the largest public cloud service provider [6]. Quality of service is an important part from the point of data security. In cloud computing there are challenging security threats for various reasons. Firstly, we can’t apply old cryptographic technique for data security protection because the user may lose control of data under cloud computing [2]. Each customer stores various kind of data in the cloud and customer wants longtime assurance of data security but the problem of verifying correctness of data stored in the cloud is more challenging. Another security threat is the customer frequently changed data which is stored in the cloud like inserting, deleting, modifying, appending, re-ordering, etc [1]. Lastly, the deployment of Cloud Computing is powered by data centers running in a synchronized, cooperated and distributed approach. Each user's data is redundantly stored in numerous physical locations to reduce the data integrity intimidation. Therefore, distributed protocols for the purpose of storage, correctness and assurance will be most important in achieving a robust and secure cloud data storage system in the existent world. However, such important region remains to be fully opened up in this literature. The cloud computing posses various service models which are given below. In this paper, we only focus on the Software as a service. In this model, cloud service providers install and operate application software in the cloud and cloud users uses the software from cloud clients. The cloud users need not manage the cloud infrastructure and platform on which the application is running. This thing eliminates the need to install and run the applications on the cloud user's computers, simplifying maintenance and support. Elasticity is the main feature which makes cloud computing different from other applications which can be achieved by cloning tasks onto multiple virtual machines at run-time to meet the changing work demand of the fastest growing IT world. Load balancers are those who distribute the work over the set of virtual machines. This process is not noticeable to the cloud user who sees only a solitary access point. To hold a large number of cloud users, cloud applications can be multitenant-any machine serves many cloud user organization. Common naming conventions to refer to special types of cloud based application software are: communication as a service, business process as a service, test environment as a service, desktop as a service. Numerous trends are opening up in the era of Cloud Computing is an Internet dependent development and use of computer technology. The low cost and more dominant processors in combination with the software as a service (SaaS) computing architecture, are transforming data centers in the pools of computing service on a large degree [4]. The growing bandwidth of network and reliable, flexible network connections make it possible that users can now subscribe high quality services from data and software that resides solely on remote data centers. The remarkable benefits, outsourcing computation to the commercial public cloud is also grudging customer’s direct control over the systems that consume and produce their data during the computation, which unavoidably brings in new security issues and challenges towards this promising computing model. On the one hand, the outsourced computation on the cloud server often contain sensitive information and data, such as the business related financial records, computational models, proprietary research data,