DOI: http://dx.doi.org/10.26483/ijarcs.v9i2.5848
Volume 9, No. 2, March-April 2018
International Journal of Advanced Research in Computer Science
RESEARCH PAPER
Available Online at www.ijarcs.info
© 2015-19, IJARCS All Rights Reserved 431
ISSN No. 0976-5697
PROTECTION OF PRIVATE CLOUD DATA TRANSACTION BY AN
PROPOSED ARCHITECTURE OF ORTHOGONAL HANDSHAKING
AUTHENTICATION MECHANISM (OHSAM)
Prof. K. Subramanian
Assistant Professor, H.H Raja’s Govt. Arts College
Department of Computer Science
Pudukottai, Tamil Nadu, India
M. Mohamed Sirajudeen
J.J College of Arts and Science
Department of Computer Science
Pudukottai, Tamil Nadu, India
Abstract: In general, the either the private or public concerns those are mainly focus on the profitable orientation organization, much more
concentrate on the security because to protect the sensitive data transaction or utilization. This paper especially focuses on the security issues
raised in the data transaction under private cloud. The security for the data transaction between the cloud service provider (CSP) and the end
users is always ensures the secure transaction. There is any conflict in the mutual authentication between these pairs to bring the issue on
Security over the data transmission. In most of the occurrences, the intruders to break the data chain during the transmission period or the data
residence portion in the CSP storage. For this reason, there is a necessity to analyze the level of secure transaction between the CSP and the
service utilization end users. It will be depicted in this research article in a clear manner and named as Orthogonal Handshaking Authentication
Mechanism (OHSAM).
Keywords: Cloud, Security, Authentication, Orthogonal and Utilization.
I. INTRODUCTION
The effective utilization of existing resources will be taken
by a mutual authentication between the cloud service
provider and the end users/clients. In general, the service
utilization taken place on-demand access in the required
occurrences. The literature survey of the cloud computing
clearly specify the cloud deployment model in to four major
categories: Private, public, Hybrid and Community [4][5].
The following table listed the categories of cloud computing
deployment models with its description,
TABLE 1: Deployment models in cloud computing
Private cloud Cloud infrastructure and computational resources are made available to the general public
over public network.
Public cloud The one customer has the exclusive access and usage of the infrastructure and computational
resources; hosted on the organizations within the campus or provided by a provider outside of
the campus.
Hybrid cloud The cloud infrastructure is a composition of two or more clouds (private, community, or
public) that remain unique entities but are bound together by standardized or proprietary
technology that enables data and application portability.
Community cloud Group of users sharing the same infrastructure and computational resources.
FIGURE 1: The Deployment models for Cloud Computing with its services