Cloud computing provides people the way to share distributed resources and services that belong to different organizations or sites. Since cloud computing share distributed resources via the network in the open environment, thus it makes security problems important for us to develop the cloud computing application. On one hand, an individual has full control on data and processes in his/her computer. On the other hand, we have the cloud computing wherein, the service and data maintenance is provided by some vendor which leaves the client/customer unaware of where the processes are running or where the data is stored. So the client has no control over it. The cloud computing uses the internet as the communication media. The vendor has to provide some assurance for security of data in the cloud computing. Organizations use cloud computing as a service infrastructure, critically like to examine the security and confidentiality issues for their business critical insensitive applications. Yet, guaranteeing the security of corporate data in the "cloud" is difficult, if not impossible, as they provide different services like Software as a service (SaaS), Platform as a service (PaaS), and Infrastructure as a service (IaaS). Each service has their own security issues. Data Protection Application Security Privacy is important security issues that have to be included in cloud computing. We propose a model system in which cloud computing system is combined with Cluster Load balancing, ssl over aes and secure session In this model, some important security services, including authentication, confidentiality and integrity, are provided in cloud computing system.
[1]
Vincent Rijmen,et al.
Rijndael, the advanced encryption standard
,
2001
.
[2]
William Stallings,et al.
Cryptography and network security - principles and practice (3. ed.)
,
2014
.
[3]
Lizhe Wang,et al.
Scientific Cloud Computing: Early Definition and Experience
,
2008,
2008 10th IEEE International Conference on High Performance Computing and Communications.
[4]
Roger M. Needham,et al.
Using encryption for authentication in large networks of computers
,
1978,
CACM.
[5]
Elaine B. Barker,et al.
Report on the Development of the Advanced Encryption Standard (AES)
,
2001,
Journal of research of the National Institute of Standards and Technology.