IJIRMPS | Volume 6, Issue 5, 2018 ISSN: 2349-7300 IJIRMPS1809009 Website : www.ijirmps.org Email : editor@ijirmps.org 45 Framework for Client Side AES Encryption Technique in Cloud Computing Jaspreet Singh Post Graduate Student SVIET Banur Abstract: Cloud computing is essentially the most rising pattern in expertise technological know-how now days. It is attracting the firms because of its benefits of scalability, throughput, handy and low cost access and on demand up and down grading of SaaS, PaaS and IaaS. Apart from the entire salient features of cloud environment, there are the massive challenges of privateness and security. This paper propose a hybrid AES to increase the security of the cloud computing. The proposed technique implemented encryption process using RSA with HMAC. This work also ensures the integrity of data using Hash codes. Authentication security of cloud computing is enhanced using multi-level authentication. Results of the proposed technique is analyzed and compared with the existing technique on the basis of data encryption time and data decryption time. Keywords: Cloud computing, Security, AES, Encryption, Decryption, RSA, HMAC, Integrity, Hash codes, Authentication. I. INTRODUCTION Cloud Computing has been pictured as the future race in structural design of IT endeavour, for the reason that of its countless advantages inside the IT enterprise. It enables on-demand resources, popular entry of network, resource pooling, resource adaptability, pay per use pricing and danger defense. The long run step in revolutionising the IT industry is to shift the model of conventional cloud to the cloud atmosphere. In conventional cloud computing buying and to possess the s/w, software and h/w to fulfil users’ essential necessitate. To configure, verify, and experiment and to assess the system s/w raises the necessity of assets protection. The useful resource utilization cost is extra to fulfil the person needs. In Cloud atmosphere the info storage and raises CPU usage allows the data storing and pay as use services according to the QoS [1]. The scalable offerings wanted by means of the person will also be purchased from the cloud proven is figure-1.1. The cloud presents countless services that can be categorized into three main fields: software-as-a-service (SaaS), Infrastructure-as-a-provider (IaaS) and Platform-as-a-provider (PaaS). The deployment units of cloud are: Hybrid model, group model, personal model, and Public model. The atmosphere in cloud additionally relates with grid computing, utility computing and obvious computing. Grid cloud computing: Its common form can be distributed computing [2]. It's composed of clusters of virtual computing as well as supercomputing, the place loosely coupled computers participate in the fundamental goals. Utility cloud computing: It consist the bundle of compute belongings. It is just like public utility offerings like water, fuel, electrical power, and telephonic amenities. Transparent cloud computing: referred to as backend cloud offerings which might be very complex. These are obvious, quandary-free and relaxed to make use of the service that gives frontend services. The expression ‘cloud’ had been used as a historical symbol for the online. The usage of the time period Cloud used to be first originate from its common description in network world outlines as an diagram of a cloud, used to specific the transportation of know-how crossing the transport backbones to one finish to an extra finish of the cloud. Nevertheless, the elemental proposal of cloud has been revived. It had been for the period of this factor of time that the phrase ‘cloud-computing’ began to forth come within the technological generation. II. BACKGROUND Gowrigolla et al. (2005) provided a brief prologue to Cloud figuring protection issue being tended to is at that point presented, by portraying a portion of the one of a kind variables to be considered when information enters the Cloud. At long last, an information assurance conspire with open examining plan is plot that will address some of these variables, by giving an instrument to permit to information to be encoded in the Cloud without loss of openness or usefulness for approved gatherings. This plan isn't really a swap for conventional protection and safety efforts for information, but instead an improvement which permits clients (once more, at either the individual or endeavor level) a more noteworthy level of trust in the reception of inventive, cost sparing Cloud registering advancements. [1] Somani et al. (2010) endeavored to get to distributed storage technique and information security in cloud by the usage of advanced mark with RSA calculation. The cloud is a next generation platform that provides dynamic resource pools, virtualization, and high availability. The predominant issue related with distributed computing is the cloud security and the proper execution of cover over the system. [2] Wang et al. (2010) combined open key based homomorphic authenticator with arbitrary concealing to accomplish the protection safeguarding open cloud information examining framework. Distributed computing is the since a long time ago envisioned vision of registering as an utility, where clients can remotely store their information into the cloud in order to appreciate the on-request astounding applications and administrations from a common pool of configurable figuring assets. By information outsourcing, clients can be calmed from the weight of nearby information stockpiling and support. Notwithstanding, the way that clients never again have physical ownership of the conceivably substantial size of outsourced information makes the information respectability security in Cloud Computing an exceptionally difficult and possibly impressive errand, particularly for clients with obliged figuring