SlideShare a Scribd company logo
IJSRD - International Journal for Scientific Research & Development| Vol. 1, Issue 8, 2013 | ISSN (online): 2321-0613
All rights reserved by www.ijsrd.com 1537
Cloud Computing Using Encryption and Intrusion Detection
Tony Durgadas Jagyasi1
1
Dept. of Computer Science and Engineering
1
Nagpur Institute of Technology Nagpur, India
Abstract— Cloud computing provides many benefits to the
users such as accessibility and availability. As the data is
available over the cloud, it can be accessed by different
users. There may be sensitive data of organization. This is
the one issue to provide access to authenticated users only.
But the data can be accessed by the owner of the cloud. So
to avoid getting data being accessed by the cloud owner, we
will use the intrusion detection system to provide security to
the data. The other issue is to save the data backup in other
cloud in encrypted form so that load balancing can be done.
This will help the user with data availability in case of
failure of one cloud.
Keywords: Cloud Computing, Encryption, Intrusion
Detection, Encryption Algorithm.
I. INTRODUCTION
The use of cloud computing has increased rapidly in recent
years in many organizations. Cloud computing provides
many benefits to the users such as accessibility and
availability. As the data is available over the cloud which is
accessed by number of different users, so there are some
security issues related to the storage of the data over the
cloud. There may be sensitive data of organization which is
stored over the cloud which can be accessed by any user.
This is the one issue to provide authentication of the user to
access the data whether it’s the owner of the cloud service
provider or the top management of the company.
The other issue can be if the cloud where the data is
stored if fails. If such things happen then there will be need
to store the same data in multiple clouds, so that if one cloud
fails then the user will get the data from the other cloud i.e.
to create backup of the encrypted data. With this, the cloud
will not get heavy due to access of the same data by multiple
authenticated users.
II. LITERATURE SURVEY
Cloud computing is used to describe platform and type of
application. This platform dynamically provides provisions,
configures, reconfigures, and servers as needed by the cloud.
Servers in the cloud can be physical machines or virtual
machines. Advanced clouds typically include other
computing resources such as storage area networks (SANs),
network equipment, firewall and other security devices [3].
Cloud computing also describes applications that are
extended to be accessible through the Internet. These cloud
applications use large data centers and powerful servers that
host Web applications and Web services. Anyone with a
suitable Internet connection and a standard browser can
access a cloud application.
Security in cloud is one of the major areas of
research. The survey shows that, the researchers are
focusing on efficient algorithms and encryption techniques
to enhance the data security in cloud.
Cloud Computing allows customers to utilize
resources and software’s which are hosted by service
providers. It mainly reduces infrastructure investment and
maintenance cost. Computing infrastructure is not known to
the users and resources are provided virtually in cloud. High
Performance Computing (HPC) allows scientists and
engineers to solve scientific, engineering and business
problems using different applications that require high
computational capabilities.
Cloud computing build a decades of research in
virtualization, utility computing, and web and programming
administrations [5]. It suggests an administration arranged
structural planning, diminished data innovation overhead for
the close client, extraordinary adaptability, decreased
aggregate cost of proprietorship, on-interest administrations
and numerous different things. Cloud computing alludes to
both the provisions conveyed as administrations over the
Internet and the fittings and frameworks programming in the
datacenters that furnish those administrations. Cloud
computing portrays both a stage and a sort of requisition. A
cloud computing stage powerfully designs, reconfigure, and
provisions servers as required. Cloud provisions are
requisitions that are broadened to be approachable through
the Internet. These cloud provisions utilize vast server farms
and effective servers that have Web requisitions and Web
administration.
Intrusion detection (NIDS) and prevention systems
(NIPS) serve a critical role in detecting and dropping
malicious or unwanted network traffic [8]. These have been
widely deployed as perimeter defense solutions in enterprise
networks at the boundary between a trusted internal network
and the untrusted Internet. This traditional deployment
model has largely focused on a single-vantage point view of
NIDS/NIPS systems, placed at manually chosen (or created)
chokepoints to provide coverage for all suspicious traffic.
Intrusion detection systems (IDS) that are used to
find out if someone have gotten into or are trying to get into
your network. The most popular IDS are Snort, which is
available at http://www.snort.org [9].
III. PROBLEM STATEMENT
Cloud providers should address privacy and security issues
as a matter of high and urgent priority. Dealing with single
cloud providers is becoming less popular with customers
due to potential problems such as service availability failure
and the possibility that there are malicious insiders in the
single cloud.
We have also addressed the problem of Accuracy,
Authenticity and Efficiency arises for building robust and
efficient intrusion detection systems.
So to solve the problem of cloud computing, we
can make the data available in multiple clouds in the
encrypted form, so that only the authenticated users can only
access the data from the cloud. This helps the cloud to share
Cloud Computing Using Encryption and Intrusion Detection
(IJSRD/Vol. 1/Issue 8/2013/0003)
All rights reserved by www.ijsrd.com 1538
the load for load balancing and make the data available in
case of failure of one cloud.
The problem is to provide security to the data from
different users getting access over the sensitive data and get
the cloud balanced by load balancing methods and give the
access of the data to the authenticated users only.
The problem of authentication can be solved by
using the layered approach of the intrusion detection system.
In this method all the layers will work autonomously. There
will be no problem of the authentication of the user
accessing the data from the cloud due to the different layers
of the system performing independent functions to check the
user authenticity.
IV. PROPOSED APPROACH
The proposed approach will consist of multiple clouds
where the user’s data will be available in the encrypted
form. The same data will be available in the different
clouds, so this will help the authenticated users to access the
data easily and allows the cloud to balance the load while
data being retrieved by the number of authenticated users at
the same time. With this the data will be retrieved by the
authenticated users only. If the other user tries to access the
data from the cloud, the user will have to pass from the
various security points i.e. different layers of the Intrusion
detection layers where the authentication of the user is done.
If the user seems to be authenticated then only the user will
get access to the data.
V. METHODOLOGY
Fig. 1: Flow Diagram
With the help of different security algorithms such as RSA
algorithm, Brute force attack algorithm, Shamir’s algorithm
etc. we are going to provide the security to the data available
over the cloud to maintain the integrity of the stored data.
With the help of different load balancing, the load of the
clouds will be shared among different clouds so that the
availability of the data should be maintained and the data
retrieval can be done easily by the authorized users.
Network security is of primary concerned for large
organizations. Various types of Intrusion Detection Systems
(IDS) are available in the market like Host based, Network
based or Hybrid depending upon the detection technology
used by them. Modern IDS have complex requirements.
With data integrity, confidentiality and availability, they
must be reliable, easy to manage and with low maintenance
cost. Various modifications are being applied to IDS
regularly to detect new attacks and handle them. In this we
will use genetic algorithm (GA) and data mining based
Intrusion Detection System.
With this all, the security of the data is maintained
with availability of the integrated data within the durable
time to access/ retrieve the data by the user.
VI. TOOLS FOR DEVELOPMENT AND
VERIFICATION OF RESULT
- Hardware requirement: Personnel Computer, Pentium
processor PIII and above, Ram 512 and above, Hard disk
20GB, Internet connection.
- Software requirement: HTML, Java, JavaScript.
- Database Connectivity: MySQL/VB.
ACKNOWLEDGMENT
We would like to thanks to all those who has given the
proper support and guidance. We would also like to thanks
to the dept. head and all the staff.
REFERENCES
[1] Privacy Preserving Public Auditing for secure cloud
storage Cong Wang, Student Member, IEEE, Sherman
S.-M. Chow, Qian Wang, Student Member, IEEE, Kui
Ren, Member, IEEE, and Wenjing Lou, Member, IEEE.
[2] Insider Threats to Cloud Computing: Directions for
New Research Challenges BY William R Claycomb,
Alex Nicoll Carnegie Mellon University.
[3] Efficient Computing With Cloud. Issue 3, March 2013
ISSN: 2277 128X International Journal of Advanced
Research in Computer Science and Software
Engineering.
[4] Cloud Computing Security: From Single to Multi-
Clouds 2012 45th Hawaii International Conference on
System Sciences.
[5] Impact of Cloud Computing on IT Industry: A Review
& Analysis International Journal of Computer and
Information Technology (ISSN: 2279 – 0764) Volume
01– Issue 02, November 2012
[6] Network-Wide Deployment of Intrusion Detection and
Prevention Systems
[7] IEEE TRANSACTIONS ON DEPENDABLE AND
SECURE COMPUTING, VOL. 7, NO. 1, JANUARY-
MARCH 2010 Layered Approach Using Conditional
Random Fields for Intrusion Detection
[8] Intrusion Detection System using Genetic Algorithm
and Data Mining International Journal of Computer
Science and Informatics ISSN (PRINT): 2231 –5292,
Vol-1, Iss-4, 2012
[9] Intrusion Detection Systems with Snort 2003 Pearson
Publication.

More Related Content

PDF
A Study of Data Storage Security Issues in Cloud Computing
PPT
Unit 3 -Data storage and cloud computing
PDF
Data Storage Issues in Cloud Computing
PDF
Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems
DOC
Security Issues in Cloud Computing by rahul abhishek
PDF
Security Issues in Cloud Computing by rahul abhishek
PDF
Encryption Technique for a Trusted Cloud Computing Environment
PDF
A survey on cloud security issues and techniques
A Study of Data Storage Security Issues in Cloud Computing
Unit 3 -Data storage and cloud computing
Data Storage Issues in Cloud Computing
Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
Encryption Technique for a Trusted Cloud Computing Environment
A survey on cloud security issues and techniques

What's hot (16)

PDF
Fog computing a new concept to minimize the attacks and to provide security i...
DOCX
Fog doc
PDF
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
PDF
Secure Data Sharing In an Untrusted Cloud
PDF
Security and privacy approach of cloud computing
PPTX
Cloud security
PDF
Cloud Auditing With Zero Knowledge Privacy
PDF
Encryption based multi user manner secured data sharing and storing in cloud
PDF
Enhancing Data Storage Security in Cloud Computing Through Steganography
PDF
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
PDF
Iaetsd cloud computing and security challenges
PDF
Kp3419221926
PDF
Excellent Manner of Using Secure way of data storage in cloud computing
PDF
Security Issues’ in Cloud Computing and its Solutions.
PDF
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
PDF
A Privacy Preserving Attribute Based Access Control Mechanism In Distributed ...
Fog computing a new concept to minimize the attacks and to provide security i...
Fog doc
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
Secure Data Sharing In an Untrusted Cloud
Security and privacy approach of cloud computing
Cloud security
Cloud Auditing With Zero Knowledge Privacy
Encryption based multi user manner secured data sharing and storing in cloud
Enhancing Data Storage Security in Cloud Computing Through Steganography
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
Iaetsd cloud computing and security challenges
Kp3419221926
Excellent Manner of Using Secure way of data storage in cloud computing
Security Issues’ in Cloud Computing and its Solutions.
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
A Privacy Preserving Attribute Based Access Control Mechanism In Distributed ...
Ad

Similar to Cloud Computing Using Encryption and Intrusion Detection (20)

PDF
An approach for secured data transmission at client end in cloud computing
PDF
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
PDF
Evaluation Of The Data Security Methods In Cloud Computing Environments
PDF
1376843836 94879193
PDF
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
PDF
1376843836 94879193
PDF
Eb31854857
PDF
Enhanced security framework to ensure data security
PDF
Enhanced security framework to ensure data security in cloud using security b...
PDF
A Review On Data Security In Cloud Computing
PDF
FRAMEWORK FOR SECURE CLOUD COMPUTING
PDF
International Journal of Computational Engineering Research(IJCER)
PDF
A study secure multi authentication based data classification model in cloud ...
PDF
Solutions of cloud computing security issues
PDF
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
PDF
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
PDF
Single Sign-on Authentication Model for Cloud Computing using Kerberos
PDF
Enforcing multi user access policies in cloud computing
PDF
Paper published
PDF
Enhancing Data Integrity in Multi Cloud Storage
An approach for secured data transmission at client end in cloud computing
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
Evaluation Of The Data Security Methods In Cloud Computing Environments
1376843836 94879193
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
1376843836 94879193
Eb31854857
Enhanced security framework to ensure data security
Enhanced security framework to ensure data security in cloud using security b...
A Review On Data Security In Cloud Computing
FRAMEWORK FOR SECURE CLOUD COMPUTING
International Journal of Computational Engineering Research(IJCER)
A study secure multi authentication based data classification model in cloud ...
Solutions of cloud computing security issues
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Single Sign-on Authentication Model for Cloud Computing using Kerberos
Enforcing multi user access policies in cloud computing
Paper published
Enhancing Data Integrity in Multi Cloud Storage
Ad

More from ijsrd.com (20)

PDF
IoT Enabled Smart Grid
PDF
A Survey Report on : Security & Challenges in Internet of Things
PDF
IoT for Everyday Life
PDF
Study on Issues in Managing and Protecting Data of IOT
PDF
Interactive Technologies for Improving Quality of Education to Build Collabor...
PDF
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
PDF
A Study of the Adverse Effects of IoT on Student's Life
PDF
Pedagogy for Effective use of ICT in English Language Learning
PDF
Virtual Eye - Smart Traffic Navigation System
PDF
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
PDF
Understanding IoT Management for Smart Refrigerator
PDF
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
PDF
A Review: Microwave Energy for materials processing
PDF
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
PDF
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
PDF
Making model of dual axis solar tracking with Maximum Power Point Tracking
PDF
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
PDF
Study and Review on Various Current Comparators
PDF
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
PDF
Defending Reactive Jammers in WSN using a Trigger Identification Service.
IoT Enabled Smart Grid
A Survey Report on : Security & Challenges in Internet of Things
IoT for Everyday Life
Study on Issues in Managing and Protecting Data of IOT
Interactive Technologies for Improving Quality of Education to Build Collabor...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
A Study of the Adverse Effects of IoT on Student's Life
Pedagogy for Effective use of ICT in English Language Learning
Virtual Eye - Smart Traffic Navigation System
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Understanding IoT Management for Smart Refrigerator
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
A Review: Microwave Energy for materials processing
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
Making model of dual axis solar tracking with Maximum Power Point Tracking
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
Study and Review on Various Current Comparators
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Defending Reactive Jammers in WSN using a Trigger Identification Service.

Recently uploaded (20)

PPTX
MET 305 MODULE 1 KTU 2019 SCHEME 25.pptx
PDF
BRKDCN-2613.pdf Cisco AI DC NVIDIA presentation
PPT
Project quality management in manufacturing
PPTX
436813905-LNG-Process-Overview-Short.pptx
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PPTX
Road Safety tips for School Kids by a k maurya.pptx
PPTX
OOP with Java - Java Introduction (Basics)
PDF
Structs to JSON How Go Powers REST APIs.pdf
PPTX
Strings in CPP - Strings in C++ are sequences of characters used to store and...
PDF
Queuing formulas to evaluate throughputs and servers
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPTX
24AI201_AI_Unit_4 (1).pptx Artificial intelligence
PDF
Monitoring Global Terrestrial Surface Water Height using Remote Sensing - ARS...
PDF
Arduino robotics embedded978-1-4302-3184-4.pdf
PPTX
anatomy of limbus and anterior chamber .pptx
PPT
Chapter 6 Design in software Engineeing.ppt
PPTX
AgentX UiPath Community Webinar series - Delhi
PPTX
Lesson 3_Tessellation.pptx finite Mathematics
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
MET 305 MODULE 1 KTU 2019 SCHEME 25.pptx
BRKDCN-2613.pdf Cisco AI DC NVIDIA presentation
Project quality management in manufacturing
436813905-LNG-Process-Overview-Short.pptx
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
Road Safety tips for School Kids by a k maurya.pptx
OOP with Java - Java Introduction (Basics)
Structs to JSON How Go Powers REST APIs.pdf
Strings in CPP - Strings in C++ are sequences of characters used to store and...
Queuing formulas to evaluate throughputs and servers
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
24AI201_AI_Unit_4 (1).pptx Artificial intelligence
Monitoring Global Terrestrial Surface Water Height using Remote Sensing - ARS...
Arduino robotics embedded978-1-4302-3184-4.pdf
anatomy of limbus and anterior chamber .pptx
Chapter 6 Design in software Engineeing.ppt
AgentX UiPath Community Webinar series - Delhi
Lesson 3_Tessellation.pptx finite Mathematics
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx

Cloud Computing Using Encryption and Intrusion Detection

  • 1. IJSRD - International Journal for Scientific Research & Development| Vol. 1, Issue 8, 2013 | ISSN (online): 2321-0613 All rights reserved by www.ijsrd.com 1537 Cloud Computing Using Encryption and Intrusion Detection Tony Durgadas Jagyasi1 1 Dept. of Computer Science and Engineering 1 Nagpur Institute of Technology Nagpur, India Abstract— Cloud computing provides many benefits to the users such as accessibility and availability. As the data is available over the cloud, it can be accessed by different users. There may be sensitive data of organization. This is the one issue to provide access to authenticated users only. But the data can be accessed by the owner of the cloud. So to avoid getting data being accessed by the cloud owner, we will use the intrusion detection system to provide security to the data. The other issue is to save the data backup in other cloud in encrypted form so that load balancing can be done. This will help the user with data availability in case of failure of one cloud. Keywords: Cloud Computing, Encryption, Intrusion Detection, Encryption Algorithm. I. INTRODUCTION The use of cloud computing has increased rapidly in recent years in many organizations. Cloud computing provides many benefits to the users such as accessibility and availability. As the data is available over the cloud which is accessed by number of different users, so there are some security issues related to the storage of the data over the cloud. There may be sensitive data of organization which is stored over the cloud which can be accessed by any user. This is the one issue to provide authentication of the user to access the data whether it’s the owner of the cloud service provider or the top management of the company. The other issue can be if the cloud where the data is stored if fails. If such things happen then there will be need to store the same data in multiple clouds, so that if one cloud fails then the user will get the data from the other cloud i.e. to create backup of the encrypted data. With this, the cloud will not get heavy due to access of the same data by multiple authenticated users. II. LITERATURE SURVEY Cloud computing is used to describe platform and type of application. This platform dynamically provides provisions, configures, reconfigures, and servers as needed by the cloud. Servers in the cloud can be physical machines or virtual machines. Advanced clouds typically include other computing resources such as storage area networks (SANs), network equipment, firewall and other security devices [3]. Cloud computing also describes applications that are extended to be accessible through the Internet. These cloud applications use large data centers and powerful servers that host Web applications and Web services. Anyone with a suitable Internet connection and a standard browser can access a cloud application. Security in cloud is one of the major areas of research. The survey shows that, the researchers are focusing on efficient algorithms and encryption techniques to enhance the data security in cloud. Cloud Computing allows customers to utilize resources and software’s which are hosted by service providers. It mainly reduces infrastructure investment and maintenance cost. Computing infrastructure is not known to the users and resources are provided virtually in cloud. High Performance Computing (HPC) allows scientists and engineers to solve scientific, engineering and business problems using different applications that require high computational capabilities. Cloud computing build a decades of research in virtualization, utility computing, and web and programming administrations [5]. It suggests an administration arranged structural planning, diminished data innovation overhead for the close client, extraordinary adaptability, decreased aggregate cost of proprietorship, on-interest administrations and numerous different things. Cloud computing alludes to both the provisions conveyed as administrations over the Internet and the fittings and frameworks programming in the datacenters that furnish those administrations. Cloud computing portrays both a stage and a sort of requisition. A cloud computing stage powerfully designs, reconfigure, and provisions servers as required. Cloud provisions are requisitions that are broadened to be approachable through the Internet. These cloud provisions utilize vast server farms and effective servers that have Web requisitions and Web administration. Intrusion detection (NIDS) and prevention systems (NIPS) serve a critical role in detecting and dropping malicious or unwanted network traffic [8]. These have been widely deployed as perimeter defense solutions in enterprise networks at the boundary between a trusted internal network and the untrusted Internet. This traditional deployment model has largely focused on a single-vantage point view of NIDS/NIPS systems, placed at manually chosen (or created) chokepoints to provide coverage for all suspicious traffic. Intrusion detection systems (IDS) that are used to find out if someone have gotten into or are trying to get into your network. The most popular IDS are Snort, which is available at http://www.snort.org [9]. III. PROBLEM STATEMENT Cloud providers should address privacy and security issues as a matter of high and urgent priority. Dealing with single cloud providers is becoming less popular with customers due to potential problems such as service availability failure and the possibility that there are malicious insiders in the single cloud. We have also addressed the problem of Accuracy, Authenticity and Efficiency arises for building robust and efficient intrusion detection systems. So to solve the problem of cloud computing, we can make the data available in multiple clouds in the encrypted form, so that only the authenticated users can only access the data from the cloud. This helps the cloud to share
  • 2. Cloud Computing Using Encryption and Intrusion Detection (IJSRD/Vol. 1/Issue 8/2013/0003) All rights reserved by www.ijsrd.com 1538 the load for load balancing and make the data available in case of failure of one cloud. The problem is to provide security to the data from different users getting access over the sensitive data and get the cloud balanced by load balancing methods and give the access of the data to the authenticated users only. The problem of authentication can be solved by using the layered approach of the intrusion detection system. In this method all the layers will work autonomously. There will be no problem of the authentication of the user accessing the data from the cloud due to the different layers of the system performing independent functions to check the user authenticity. IV. PROPOSED APPROACH The proposed approach will consist of multiple clouds where the user’s data will be available in the encrypted form. The same data will be available in the different clouds, so this will help the authenticated users to access the data easily and allows the cloud to balance the load while data being retrieved by the number of authenticated users at the same time. With this the data will be retrieved by the authenticated users only. If the other user tries to access the data from the cloud, the user will have to pass from the various security points i.e. different layers of the Intrusion detection layers where the authentication of the user is done. If the user seems to be authenticated then only the user will get access to the data. V. METHODOLOGY Fig. 1: Flow Diagram With the help of different security algorithms such as RSA algorithm, Brute force attack algorithm, Shamir’s algorithm etc. we are going to provide the security to the data available over the cloud to maintain the integrity of the stored data. With the help of different load balancing, the load of the clouds will be shared among different clouds so that the availability of the data should be maintained and the data retrieval can be done easily by the authorized users. Network security is of primary concerned for large organizations. Various types of Intrusion Detection Systems (IDS) are available in the market like Host based, Network based or Hybrid depending upon the detection technology used by them. Modern IDS have complex requirements. With data integrity, confidentiality and availability, they must be reliable, easy to manage and with low maintenance cost. Various modifications are being applied to IDS regularly to detect new attacks and handle them. In this we will use genetic algorithm (GA) and data mining based Intrusion Detection System. With this all, the security of the data is maintained with availability of the integrated data within the durable time to access/ retrieve the data by the user. VI. TOOLS FOR DEVELOPMENT AND VERIFICATION OF RESULT - Hardware requirement: Personnel Computer, Pentium processor PIII and above, Ram 512 and above, Hard disk 20GB, Internet connection. - Software requirement: HTML, Java, JavaScript. - Database Connectivity: MySQL/VB. ACKNOWLEDGMENT We would like to thanks to all those who has given the proper support and guidance. We would also like to thanks to the dept. head and all the staff. REFERENCES [1] Privacy Preserving Public Auditing for secure cloud storage Cong Wang, Student Member, IEEE, Sherman S.-M. Chow, Qian Wang, Student Member, IEEE, Kui Ren, Member, IEEE, and Wenjing Lou, Member, IEEE. [2] Insider Threats to Cloud Computing: Directions for New Research Challenges BY William R Claycomb, Alex Nicoll Carnegie Mellon University. [3] Efficient Computing With Cloud. Issue 3, March 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering. [4] Cloud Computing Security: From Single to Multi- Clouds 2012 45th Hawaii International Conference on System Sciences. [5] Impact of Cloud Computing on IT Industry: A Review & Analysis International Journal of Computer and Information Technology (ISSN: 2279 – 0764) Volume 01– Issue 02, November 2012 [6] Network-Wide Deployment of Intrusion Detection and Prevention Systems [7] IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 7, NO. 1, JANUARY- MARCH 2010 Layered Approach Using Conditional Random Fields for Intrusion Detection [8] Intrusion Detection System using Genetic Algorithm and Data Mining International Journal of Computer Science and Informatics ISSN (PRINT): 2231 –5292, Vol-1, Iss-4, 2012 [9] Intrusion Detection Systems with Snort 2003 Pearson Publication.