SHODH SANGAM – A RKDF University Journal of Science and Engineering http://www.shodhsangam.rkdf.ac.in/ Vol.–01, No.–02, Aug–2018, Page – 1 ISSN No. 2581–5806 Analysis and Encryption Technique using Multi-Dimensional Protection in Cloud Computing Ankur Saxena 1 , Raj Kumar Paul 2 , 1,2 Department of Computer Science & Engineering, RKDF University, Bhopal, India Abstract: In this day and age where each measurement of human life is seeing new advancements relatively con- sistently, the conventional processing is likewise enhancing exponentially. A standout amongst the most progressive change is the origination of Cloud computing. Cloud com- puting bolsters appropriated benefit situated engineering, multi-client and multi-space regulatory framework. Along these lines, it is more inclined to security dangers and vul- nerabilities. It not only offers a high degree of mobility, flexibility to its user, it provides a hassle free environment. In this paper, it is talk about a portion of the systems that were implemented to data security and propose avail- ability data in cloud. giving multi-dimensional security to cloud framework, up to a specific degree this arrangement additionally obliges the need to framework availability. We have used AES and Blowfish as encryption techniques and CHAP (Challenge Handshake protocol) as an authentication technique to achieve some of the security goals. Keywords: Cloud Computing, Encryption Techniques, Authentication, Security, CHAP, AES. I Introduction Cloud Computing is a combination of IT administrations given by many specialist co-ops. The term cloud was begun from the web and is likewise a stage that gives individuals the open door for sharing assets, administrations and data internationally [1]. As per the Cloud definition given by Cloud Security Al- liance Group [6], Cloud figuring advocates the utilization of accumulation of administrations, applications, informa- tion and foundation which involves a reusable pool of PCs, processors, data and capacity media. These reusable parts can be quickly provisioned, executed and decommissioned, scaled-up or down to give an on-request utility model of designation and utilization of assets [2]. Gartner defines cloud computingas a style of computing in which scalable and elastic IT-enabled capabilities are de- livered as a service using Internet technologies. Strong con- fidentiality means cloud providers will not be able to access the data. For example confidential and classified business in- formation, government secret information, etc. Applications that execute in the cloud can poise several factors including load balancing, bandwidth, size of data and security [3, 4]. One of the key obstacles to cloud approval is data security and privacy, because the user and the service provider are not contained in the same trusted domain. Figure 1: Cloud Computing Security issues are increasingly significant in lower layer Infrastructure as a Service (IaaS) to higher Platform as a Service (PaaS). These cloud layers are deployed (public, pri- vate, community, and hybrid) in high end MCC (Mobile Cloud Computing). Users vacillate to shift into the cloud because of certain ambiguities in its architecture that makes cloud computing insecure [5]. II Characteristics of Cloud Com- puting Following inherent characteristics of cloud computing makes it a highly promising computing platform to use [6]. On-Demand Self-Service Users of cloud computing have the flexibility to easily man- age the resources like processors, storage media and network resources as per their need, and more surprisingly it does not require any manual intervention of any administrator or service provider.