International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7031 Multimedia Content Security with Random Key Generation Approach in Cloud Computing Chandan Thakur 1 , Rashmita Pandey 2 , Nusrat Parveen 3 1,2 Student, Computer Department, Datta Meghe College of Engineering, Maharashtra, India 3 Professor, Computer Department, Datta Meghe College of Engineering, Maharashtra, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - The cloud computing offers high scalability, confidentiality and easy accessibility of information over the internet. Though the conventional encryption system provides security, the most concerned issue is the regular side channel attack for capturing ones sensitive and confidential image, audio and video. A malicious Virtual Machine (VM) beside targeted VM can extract all information. Thus, this paper implements double stage encryption algorithm for multimedia content security using random key generation. The first stage encrypts multimedia content into ciphertext-1 using a symmetric public key. The ciphertext-1 is again encrypted in the cloud using a randomly generated symmetric private key. If anyone gets the cipher text, he could not extract the encryption key to recover multimedia contents. Low complexity and easy implementations make the proposed algorithm widely applicable safeguard in cloud computing. Keyword: Cipher text, Encryption, Multimedia, Virtual Machine, random Key generation 1.INTRODUCTION 1.1 Cloud Computing: Cloud computing is freedom of processing and storing data of consumers in the third-party data center using remote computing resources over the Internet. The cloud is the combination of three services. The goal of cloud computing is to allow users to take benefit from all these technologies, without the need for deep knowledge. The cloud computing aims to cut costs, and helps the users to focus on their core business instead of being impeded by IT obstacles. Cloud computing and storage solutions provides services to users and enterprises with various capabilities to store and process their data in third party data centers that may be located far from user-ranging in distance from across a city to across the world. A third party manages the data and multimedia contents and has the liabilities to make certain security for the protection of data and multimedia contents and provide uninterrupted services. Unless there may be arise in security question and trustworthiness of third party.Beside the third party deliberately or inadvertently discloses the data. 1.2 Security issues in Cloud: While it is generally agreed that encryption is necessary to protect data security, working with encrypted data proves to be challenging in cloud. The problem of using public cloud is the cloud owner can’t be trusted with the data. to be challenging in cloud. The problem of using public cloud is the cloud owner can’t be trusted with the data. Hence a solution is required to safeguard the data. A solution would be to download and decrypt all the documents to extract the relevant information. 1.2.1 Data Integrity: A secured system ensures that the data it contains is valid. Data integrity implies that knowledge is protected against deletion and corruption each once it's among the information, and whereas it's being transmitted over the network. 1.2.2 Data Confidentiality: A secure system ensures the confidentiality of data. This means that it allows users to see only those data which they are supposed to see. Whenever possible, confidential data should be encrypted and decrypted during on- premises or end-point processing before it is transferred to the cloud. The key concern is protecting data confidentiality in end-to-end fashion. 1.2.3 Access Control: Access control states that information shared over cloud must be accessible to authorized users. Access should be given to only those users who have authority to gain the access to the shared data. 1.2.4 Data Manipulation: It is an effort to make data more easier to read or to be more organized. 2. LITERATURE SURVEY In cloud computing, since it is a new area, the developers are concentrating more on computation speed and storage issue. Users are going for unreliable networks