New Approach for Managing Keys in Cloud & Use Cases for Cloud Computing

: Now a day’s cloud computing is best innovative technology in the field of IT. In its broadest usage, the term cloud computing refers to the delivery of IT resources over the internet as opposed to hosting and operating these resources locally, such as a college or university network. These resources can include application and services as well as infrastructure and services over the network. Any organization can purchase these resources on as needed basis and avoid the capital expenditure cost of software and hardware. Security is major problem in cloud computing, thus key distribution is important thing for managing security in cloud computing. In this paper we derived a proposed algorithms for managing keys in the cloud and also discuss uses cases for cloud computing .

Introduction: Cloud computing is just internet based computing. If we have an internet connection, then we can now access the features of cloud computing. If we have Gmail account, it means we are using cloud.
First we do not download Gmail account on my hard drive of my computer, only we see and leave it. Then point arises here that where our Gmail files is stored or Face book account where we can upload picture, videos and YouTube uploading video, where it is stored. It is stored on clouds. If we leave anything on web so we uses cloud computing.
We can see again Gmail files by internet technology. Some years ago, software installed on your computer or on your mobile, and then we can use this software on your computer on your mobile. But using of cloud computing, we can use these types of software without installation or without download from your computer or your mobile or your tablets. We can use it, we can change it from any machine like Tablet, computer or mobile E.g. Google Doc. All the world companies want to use the power and benefits of cloud computing. Amazon allows to his customers to put their list of favourite songs on his clouds.
Apple is making own cloud called I Cloud. We can also find use of free cloud computing services e.g. Google doc, icloud.We will not pay for using this cloud service. As the many software runs on webs, then we going in clouds depend upon internet. In this paper we will discuss about challenges and use cases of cloud computing and searchable solution for managing security in cloud computing.
Basic terminology of cloud computing: there are some basic terms related to cloud computing.
1. Service level agreement: it is a contract between consumer and provider that specifies consumer requirements and providers commitment. 2. Federation: it is the act of combining data across multiple systems that is done by either cloud provider or cloud broker. 3. Broker: a broker has no cloud resources but matches between consumers and providers resources. 4. Multi-Tenancy: it is the property of applications or data from different enterprises hosted on same physical hardware. 5. Cloud brusting: it is a techniques used by hybrid clouds to provide additional resources to private cloud as needed basis. If the private cloud has no need of resources then hybrid cloud is not used. 6. Policy: general term for operating a procedure ie. A security policy means that it must specify that all requests to a particular cloud services must be in encrypted mode. 7. Virtual machine: A file typically called an image that when executed looks like user like an actual machine.

Challenges:
Council for Innovative Research

Problem formulation
1. Problem of building a secure cloud storage device on top of a public cloud infrastructure where the service provider is not completely trusted by the customer. 2. at high level, several architectures that combine recent and non standard cryptographic primitives in order to achieve our goal. 3. Cloud security issues involves in protected clouds from outside threats are similar to those already facing large data centres except that responsibility is divided between the cloud user and cloud operator.
Use cases scenarios for cloud computing: there are some use cases approaches for cloud computing.

End user to cloud:
Applications are running in the cloud and accessed by end users.

Enterprise to cloud to end user:
Applications are running in the cloud and accessed by employees and customers.
3. Enterprise to cloud: cloud applications are merged with internal capabilities.

Enterprise to cloud to enterprise:
Applications running in the cloud and used by partner enterprises.

Private cloud:
A cloud that is hosted by an organization inside their firewall.

Proposed approach:
A. Future cloud computing services will not only be encrypt documents to keep them safe in the cloud but also make it possible to search and retrieve this information without first decrypting it. B.development of make the encrypted cloud more searchable. C. cloud users could download software that would encrypt their data before it is sent into the cloud. In addition to software would issue encrypted strings called token, which can be used to check that documents are intact and crucially to search their contents without first having to decrypt them.

Implementation of cloud security:
Cloud security is major concern in cloud computing. Can we trust on cloud service provider? IS service provider is fully trusted for managing the keys and maintaining the data in cloud. Thus there are some points related it.  Isolation among resources of different tenants like hypervisor,storage,network  Interfaces for client controlled audits for long term process.  Engage third party auditors.

Mechanism implemented by clients:
 Cryptographically protect the data  Remote auditing

Proposed algorithms:
How we manage keys in the cloud for security purposes. This is defined by new proposed algorithms.
 Strong interface using unstructured objects called blobs.  Each object is identified by unique key.  Objects grouped into containers.
Operations: Put (key, obj) Get (key, obj)-get(key)-obj List ()-{obj---} Remove key Algorithm:  Share secret key S among parties P1----Pn such that  Any t<n/2 parties have no info about S  Any group of t+1 parties can receive the secret S  Trusted dealer picks random polynomial a(x) that is a(x) belongs to F(x) degree t and a(0)=s  Share for Pi is Si = a(i)  Given set U of (t+1) shares, recover secret S=a(0)= Fj belongs to U dj aj Where dj-lagrange co-efficient w.r.t U

Conclusions:
Thus we can say cloud computing is one of the latest developments in the field of IT industry also known as on demand cloud computing. It is the application provided in the form of services over the internet. The implementation of algorithm will show that we can manage keys before putting data in the cloud. In this paper we also discussed about some use cases approach for cloud computing and some basic terminology that are used in cloud computing.