DOI: http://dx.doi.org/10.26483/ijarcs.v9i2.5848 Volume 9, No. 2, March-April 2018 International Journal of Advanced Research in Computer Science RESEARCH PAPER Available Online at www.ijarcs.info © 2015-19, IJARCS All Rights Reserved 431 ISSN No. 0976-5697 PROTECTION OF PRIVATE CLOUD DATA TRANSACTION BY AN PROPOSED ARCHITECTURE OF ORTHOGONAL HANDSHAKING AUTHENTICATION MECHANISM (OHSAM) Prof. K. Subramanian Assistant Professor, H.H Raja’s Govt. Arts College Department of Computer Science Pudukottai, Tamil Nadu, India M. Mohamed Sirajudeen J.J College of Arts and Science Department of Computer Science Pudukottai, Tamil Nadu, India Abstract: In general, the either the private or public concerns those are mainly focus on the profitable orientation organization, much more concentrate on the security because to protect the sensitive data transaction or utilization. This paper especially focuses on the security issues raised in the data transaction under private cloud. The security for the data transaction between the cloud service provider (CSP) and the end users is always ensures the secure transaction. There is any conflict in the mutual authentication between these pairs to bring the issue on Security over the data transmission. In most of the occurrences, the intruders to break the data chain during the transmission period or the data residence portion in the CSP storage. For this reason, there is a necessity to analyze the level of secure transaction between the CSP and the service utilization end users. It will be depicted in this research article in a clear manner and named as Orthogonal Handshaking Authentication Mechanism (OHSAM). Keywords: Cloud, Security, Authentication, Orthogonal and Utilization. I. INTRODUCTION The effective utilization of existing resources will be taken by a mutual authentication between the cloud service provider and the end users/clients. In general, the service utilization taken place on-demand access in the required occurrences. The literature survey of the cloud computing clearly specify the cloud deployment model in to four major categories: Private, public, Hybrid and Community [4][5]. The following table listed the categories of cloud computing deployment models with its description, TABLE 1: Deployment models in cloud computing Private cloud Cloud infrastructure and computational resources are made available to the general public over public network. Public cloud The one customer has the exclusive access and usage of the infrastructure and computational resources; hosted on the organizations within the campus or provided by a provider outside of the campus. Hybrid cloud The cloud infrastructure is a composition of two or more clouds (private, community, or public) that remain unique entities but are bound together by standardized or proprietary technology that enables data and application portability. Community cloud Group of users sharing the same infrastructure and computational resources. FIGURE 1: The Deployment models for Cloud Computing with its services