International Journal of Computer Applications (0975 – 8887) Volume 96 – No.23, June 2014 32 Enhancement of the Private Cloud Data Transaction by using an Orthogonal Handshaking Authentication Protocol (OHSAP) M.Mohamed Sirajudeen Department of Computer Science J.J College of Arts and Science, Pudukottai Tamil Nadu, India K.Subramanian, PhD Department of Computer Science J.J College of Arts and Science, Pudukottai Tamil Nadu, India ABSTRACT Now a day, “Cloud Computing” is an inevitable trend in the field of information technology due to the reason for information sharing as well as the resource utilization. In most of the organizations either it may be a profitable or non profitable category must focus on the resource sharing due to minimization of its infrastructure development cost. In spite of its tremendous growth, there will be a great question mark for the security on the data transaction between the cloud service providers (CSP) and the end user or client. The privacy information stored in the cloud service provider data bases will be utilized by the authorized end users in many occasions as well as it will be shared by communication channel with highly secured authentication protocols. Even though existence of several cryptographic algorithms, the intruders breaks the cipher text for the authentication protocol and create a road map for data loss. In this research paper especially focus on the security issues of data transaction under private cloud with the help of the proposed protocol named as “Orthogonal Handshaking Authentication Protocol (OHSAP)”. Keywords: Cloud, Private, Security, Data and Authentication. 1. INTRODUCTION Security for the data storage as well as the utilization is a challenging task either in the public /private cloud environments for the reason of the service consumer/clients attempt themselves to do the data transactions. In the category of private cloud service providers are always ensure themselves a secure data storage management or service allocation for the clients. Anyhow, there will be numerous possibilities for the intruders attack on the data transaction by the third party agents/intruders. The possibility for the data loss due to the interruption for unauthorized users is clearly depicted by the fig 1.1. The major issues are the security for the existing /stored data in the cloud server. Usually, the required user utilize the service via the cloud may cause the problem of data loss or intruder inject his own message. In this, case there is a question mark for the security on the private data transmission between the cloud server and the service consumer. In this paper address this issue and propose the solution to protect it. The data transaction over the common communication channel always needs an advanced security mechanism to ensure the secure transaction especially in the privacy information for clients or end users. In most of the occurrences, the privacy information’s or confidential documents will be modified by the intruders on the communication channel with the help of malicious authentication protocols. The orthogonal handshaking authentication protocol (OHSAP) mechanism is a proposed security solution; it allows data to be protected in storage and transit in private clouds in a specialized form of an Encryption. The information sharing between the end users with the help of cloud service provider (CSP) is usually carried out by the web based tools or applications [1]. In general, the functional components of the cloud service providers will be categorized as Infrastructure as a Service (IaaS), Platform as a Service (PaaS) [4], and Software as a Service (SaaS) and other different services are also to offer [2][3][4]. 2. RELATED WORK In the contemporary trends in information technology provide a root cause for simplify the task of the resource sharing and utilization .In the meantime, the cloud service provider must ensure the communication will be a secure one especially in the sensitive data transactions under the private cloud . In few circumstances, the unauthorized users try to break the encrypted key exchange or to find the physical address for the CSP by the way to create an unauthenticated effective server in the path of data communication and indulged in the information theft [5]. The data on cloud will be intersected by the intruders either in the data at rest in the data store or in the transaction. For this reason, the researchers focus these above two aspect whenever try to propose or implement a security algorithms. The attempt of a security attack in the data store usually prevent by using an encryption mechanism for ensuring the data confidentiality and to secure the data during transaction by using an authentication protocols. In the way of ensuring the data encryption will be based on the encrypted text (Cipher Text) and the Encryption Key (E K ) [6]. In general the “cloud computing” data storage and access to be entertain huge volume of data storage as well as data transaction. In this perspective, the researchers also concentrate on the time delay for the response. The end user or clients submits their request in order to access the data to be stored on the cloud storage, it will give a quick response. If the processing time for the proposed algorithms by the researchers takes long time to run the application, abruptly