ISSN : 0976-8491 (Online) | ISSN : 2229-4333 (Print) IJCST Vo l . 6, Iss u e 3, Ju l y - Se p t 2015 Hash Key Based Effective Algorithm for Security in Cloud Infrastructure 1Sachin Gupta, 2Dr. S.N. Panda, 3Dr. Bharat Bhushan 1Research Scholar, Punjab Technical University, Kapurthala, Punjab, India 2Director Research, Centre of Excellence Chitkara University, Punjab Campus, Rajpura, Punjab, India 3Assoc Prof & Head, Dept. of Computer Science & Applications, G.N. Khalsa College, Haryana, India

Abstract (OS). These copy a current framework building design, and are is one of the growing domain in which remote fabricated with the reason for either giving a stage to run programs resources are used on demand basis without having the physical where the genuine equipment is not accessible for utilization or infrastructure at the client end. In cloud computing, the actual of having numerous occurrences of virtual machines prompting resources are installed and deployed at remote locations. These more effective utilization of figuring assets, both regarding resources are accessed remotely with different network based vitality utilization and expense viability (known as equipment protocols. Cloud Computing technology is considered as a , the way to a distributed computing environment), metaphor for /Web Based Services in which there is the or both. provision of Computational Resources On-Demand and hides end- user knowledge of the physical location and configuration of server. Process Virtual Machine (Language Virtual Machine) This paper underlines assorted aspects of cloud technology and This sort of virtual machine is intended to execute a solitary simulation including the implementation of secured dynamic key project which implies that it underpins a solitary methodology. based algorithm in cloud infrastructure. The proposed algorithm Such virtual machines are nearly suited to one or all the more implements the dynamic key generated at each layer of the data programming dialects and manufactured with the motivation channel to be transmitted towards the data centers. The proposed behind giving project movability and adaptability (amongst work is compared based on the parameters cost and execution different things). A vital normal for a virtual machine is that the time. The parameters in the proposed approach are giving better, product running inside is constrained to the assets and reflections optimal and effective results in multiple cloud scenarios. gave by the virtual machine - it can’t section or break out its virtual surroundings. Keywords Cloud Computing, Cloud Security, Dynamic Key Based Security, Prominent Virtualization Software Dynamic Hash Key, Secured Load Balancing Windows as Host OS I. Introduction • VMWare Workstation (Any Guest OS) Cloud Computing is one of the prominent technology in which all • Virtual (Any Guest OS) computing resources like hardware, software and platforms for • Hyper-V (Any Guest OS) developing applications are provided as services to the customers through internet. as Host OS • VMWare Workstation Virtualization is the major technology that works with cloud • Microsoft Virtual PC computing. Actual cloud is implemented with the use of • VMLite Workstation virtualization technology. In Cloud computing, the dynamic virtual • VirtualBox machines are created to provide the access of actual infrastructure • to the end user or developer at other remote location. A hypervisor or virtual machine screen (VMM) is a bit of PC A virtual machine or simply VM is the software implementation programming, firmware or equipment that makes and runs virtual of any computing device or machine or computer that executes machines. A PC on which a hypervisor is running one or more the series of instructions or programs as a physical (actual) virtual machines is characterized as a host machine. Every virtual machine. When a user or developer works on a virtual machine, the machine is known as a visitor machine. The hypervisor presents the resources including all programs installed on the remote machine visitor working frameworks with a virtual working stage and deals are accessible using a specific set of protocols. Here, for the end with the execution of the visitor working frameworks. Various user of the cloud service, the virtual machine acts like the actual examples of an assortment of working frameworks may impart machine. the virtualized equipment assets.

The term VM was originally proposed and defined by Popek and Hypervisors of Type 1 (Bare Metal Installation) and Type Goldberg as “an efficient, isolated duplicate of a real machine”. 2 (Hosted Installation) Virtual machines are identified into two major classifications, In the implementation and deployment of the cloud service, type depending on their use and degree of correspondence to any real 1 hypervisors are used. Hypervisors of type 1 are associated with machine: the concept of bare metal installation. It means there is no need of any host operating system to install the hypervisor. By this System Virtual Machine technology, there is no risk of getting the host operating system System Virtual Machine gives a complete framework stage corrupt. These hypervisors are directly installed on the hardware that backings the execution of a complete working framework without need of any other operating system. On this hypervisor, www.ijcst.com International Journal of Computer Science And Technology 25 IJCST Vo l . 6, Iss u e 3, Ju l y - Se p t 2015 ISSN : 0976-8491 (Online) | ISSN : 2229-4333 (Print) multiple virtual machines are created. Hypervisor Type 2 Products • VMware Workstation A Type-1 hypervisor is a type of client hypervisor that interacts • VirtualBox directly with hardware that is being virtualized. It is completely independent from the operating system, unlike a Type-2 hypervisor, Hypervisors in Industry and boots before the operating system (OS). Currently, Type-1 Hypervisor Cloud Service Provider hypervisors are being used by all the major players in the desktop virtualization space, including but not limited to VMware, Amazon EC2 Microsoft and Citrix. IBM SoftLayer The classical virtualization software or type 2 hypervisor is Xen Fujitsu Global Cloud Platform always installed on any host operating system. If host operating Linode system gets corrupt or crashed by any reason, the virtualization OrionVM software or type 2 hypervisor will also be crashed and obviously all virtual machines and other resources will be lost. That’s why ESXi VMWare Cloud the technology of hypervisor or bare metal installation is very Red Hat famous in the cloud computing world. HP KVM Del Type 2 (Hosted) hypervisors execute inside a routine working framework environment. With the hypervisor layer as an unique Rackspace second programming level, visitor working frameworks run at Hyper-V the third level over the equipment. A Type-2 hypervisor is a kind of customer hypervisor that sits on top of a working framework. Data Centers and Uptime Tier Levels Dissimilar to a Type-1 hypervisor, a Type-2 hypervisor depends As virtual machine is one of the mandatory aspects of the cloud vigorously on the working framework. It can’t boot until the computing, the term is also essential part of the working framework is now up and running and, if for any reason technology. All the cloud computing infrastructures are located the working framework crashes, all end-clients are influenced. in the remote data centers that used to keep all the resources This is a major disadvantage of Type-2 hypervisors, as they are including computer systems and associated components, such as just as secure as the working framework on which they depend. telecommunications and storage systems. Data centers classically Additionally, since Type-2 hypervisors rely on upon an OS, they includes redundant or backup power supplies, redundant data are not in full control of the end client’s machine. communications connections, environmental controls, air conditioning, fire suppression as well as security devices. Hypervisor Type 1 Products • VMWare ESXi Tier level is considered as the rating or evaluation aspects of • Citrix Xen the data centers. Large data centers are used for industrial scale • KVM (Kernal Virtual Machine) operations using as huge electricity consumption such as a small • Hyper-V town. The standards are comprised of a four-tiered scale, with Tier 4 being the most robust and full featured.

Tier Level Requirements Possible unavailability in a given year • Single non-redundant distribution path serving the IT equipment 1729.224 minutes 1 • Non-redundant capacity components (28.8 Hours) • Basic site infrastructure with expected availability of 99.671% • Meets or exceeds all Tier 1 requirements 1361.304 minutes 2 • Redundant site infrastructure capacity components with expected (22.6 Hrs) availability of 99.741% • Meets or exceeds all Tier 1 and Tier 2 requirements • Multiple independent distribution paths serving the IT equipment • All IT equipment must be dual-powered and fully compatible 94.608 minutes 3 with the topology of a site’s architecture (1.5 Hours) • Concurrently maintainable site infrastructure with expected availability of 99.982% • Meets or exceeds all Tier 1, Tier 2 and Tier 3 requirements • All cooling equipment is independently dual-powered, including chillers and heating, ventilating and air-conditioning (HVAC) 26.28 minutes 4 systems (0.4Hr’s) • Fault-tolerant site infrastructure with electrical power storage and distribution facilities with expected availability of 99.995%

26 International Journal of Computer Science And Technology www.ijcst.com ISSN : 0976-8491 (Online) | ISSN : 2229-4333 (Print) IJCST Vo l . 6, Iss u e 3, Ju l y - Se p t 2015

II. Architecture • Modeling and simulation of energy-aware computational Security inside distributed computing is a particularly resources troubling issue in light of the way that the gadgets used to give • Modeling and simulation of data center network topologies administrations don’t fit in with the clients themselves. The clients and message-passing applications have no control of, nor any learning of, what could happen to • Modeling and simulation of federated clouds their information. This is an extraordinary concern in situations • Dynamic insertion of simulation elements, stop and resume when clients have profitable and individual data put away in a of simulation distributed computing administration. Clients won’t trade off their • User-defined policies for allocation of hosts to virtual protection so distributed computing administration suppliers must machines and policies for allocation of host resources to guarantee that the clients’ data is sheltered. This, on the other virtual machines hand, is getting to be progressively difficult on the grounds that as security improvements are made, there dependably is by all Scope and Features of Cloud Simulations accounts somebody to make sense of an approach to debilitate • Data Centers the security and exploit client data. A portion of the imperative • Load Balancing segments of Service Provider Layer are SLA Monitor, Metering, • Creation and Execution of Cloudlets Accounting, Resource Provisioning, Scheduler& Dispatcher, Load • Resource Provisioning Balancer, Advance Resource Reservation Monitor, and Policy • Scheduling of Tasks Management. A percentage of the security issues identified with • Storage and Cost Factors Service Provider Layer are Identity, Infrastructure, Privacy, Data • Energy Optimization … and many others transmission, People and Identity, Audit and Compliance, Cloud honesty and Binding Issues. A percentage of the vital segments Cloud Simulation Tools and Plugins of Virtual Machine Layer makes number of virtual machines and • CloudSim number of working frameworks and its observing. A percentage • CloudAnalyst of the security issues identified with Virtual Machine Layer are • GreenCloud VM Sprawl, VM Escape, Infrastructure, Separation between • iCanCloud Customers, Cloud legitimate and Regularity issues, Identity and • MDCSim Access administration Some of the critical parts of Data Center • NetworkCloudSim (Infrastructure) Layer contains the Servers, CPU’s, memory, and • VirtualCloud capacity, and is from now on commonly meant as Infrastructure- • CloudMIG Xpress as-a-Service (IaaS). A percentage of the security issues identified • CloudAuction with Data Center Layer are secure information very still, Physical • CloudReports Security: Network and Server. • RealCloudSim • DynamicCloudSim Cloud Simulations • WorkFlowSim To get access to cloud services, the cloud service providers charge depending upon the space or service provided to the client. CloudSim CloudSim is one of famous simulator for cloud parameters In research and development, it is not always possible to have the developed in the CLOUDS Laboratory, at the Computer Science actual cloud infrastructure for performing the experiments. For and Software Engineering Department of the University of any research scholar, academician or scientist, it is not feasible Melbourne. every time to hire the cloud services and then executing their algorithms or implementations. Following operations can be performed using CloudSim Library For the purpose of research, development and testing, the open • Large scale Cloud computing data centers source libraries are available using which the feel of the cloud • Virtualized Server Hosts with customizable policies services and executions can be experienced. Now days, in research • Support for modeling and simulation of large scale Cloud market, the cloud simulators are widely used by the research computing data centers scholars and practitioners without paying any amount to any cloud • Support for modeling and simulation of virtualized server service provider. hosts, with customizable policies for provisioning host resources to virtual machines Using cloud simulators, the researchers can execute their • Support for modeling and simulation of energy-aware algorithmic approaches on a software based library and can get computational resources the results in different parameters including energy optimization, • Support for modeling and simulation of data center network security, integrity, confidentiality, bandwidth, power and many topologies and message-passing applications others. • Support for modeling and simulation of federated clouds • Support for dynamic insertion of simulation elements, stop Tasks Performed by using the Cloud Simulators and resume of simulation • Modeling and simulation of large scale Cloud computing • Support for user-defined policies for allocation of hosts to data centers virtual machines and policies for allocation of host resources • Modeling and simulation of virtualized server hosts, with to virtual machines customizable policies for provisioning host resources to • Energy-aware computational resources virtual machines • Data center network topologies and message-passing www.ijcst.com International Journal of Computer Science And Technology 27 IJCST Vo l . 6, Iss u e 3, Ju l y - Se p t 2015 ISSN : 0976-8491 (Online) | ISSN : 2229-4333 (Print)

applications ======OUTPUT ======• Dynamic insertion of simulation elements, stop and resume Cloudlet ID STATUS Data center ID VM ID Time Start of simulation Time Finish Time • User-defined policies for allocation of hosts to virtual ======machines 1 SUCCESS 3 1 160 0.2 160.2 0 SUCCESS 2 0 320 0.2 320.2 The major limitation with CloudSim is the lack of Graphical User 2 SUCCESS 2 0 320 0.2 320.2 Interface (GUI). Despite of this limitation, CloudSim is still used ------in the universities and industry for the simulation of cloud based Cloud Simulation Finish algorithms. Simulation Scenario Finish with Successful Matching of the Keys After execution of the code in Eclipse, following output will ------be generated. It is evident from the following output that the Simulation Scenario Execution Time in MillSeconds => 5767 integration of dynamic key exchange is implemented with the Security Parameter => 30.959372773933122 CloudSim Code. ------Starting Cloud Simulation with Dynamic and Hybrid Secured Key ------Initialising... MD5 Hash Digest(in Hex. format)::6e47ed33cde35ef1cc100a7 8d3da9c9f Hybrid Approach (SHA+MD5) Hash Hex format : b0a309c 58489d6788262859da2e7da45b6ac20a 0 5 2 b 6 e 6 0 6 e d 1 7 59648e43e40b Hybrid Approach Based (SHA+MD5) Security Key Transmitted => Fig. 1: Comparison of Efficiency Between Classical and Proposed ygcxsbyybpr4¢­ ª¢£?¡®­£ Approach Starting CloudSim version 3.0 CloudDataCenter-1 is starting... The figure shows the comparative analysis between classical and CloudDataCenter-2 is starting... proposed approach. It is clear from the results that the proposed Broker is starting... approach is giving better results as compared to the classical in Entities started. terms of efficiency and integrity. 0.0: Broker: Cloud Resource List received with 2 resource(s) 0.0: Broker: Trying to Create VM #0 in CloudDataCenter-1 0.0: Broker: Trying to Create VM #1 in CloudDataCenter-1 [VmScheduler.vmCreate] Allocation of VM #1 to Host #0 failed by MIPS 0.1: Broker: VM #0 has been created in Datacenter #2, Host #0 0.1: Broker: Creation of VM #1 failed in Datacenter #2 0.1: Broker: Trying to Create VM #1 in CloudDataCenter-2 0.2: Broker: VM #1 has been created in Datacenter #3, Host #0 0.2: Broker: Sending cloudlet 0 to VM #0 0.2: Broker: Sending cloudlet 1 to VM #1 0.2: Broker: Sending cloudlet 2 to VM #0 160.2: Broker: Cloudlet 1 received 320.2: Broker: Cloudlet 0 received Fig. 2: Comparison Between Existing and Proposed Approach in 320.2: Broker: Cloudlet 2 received terms of Execution Time and Complexity 320.2: Broker: All Cloudlets executed. Finishing... 320.2: Broker: Destroying VM #0 320.2: Broker: Destroying VM #1 Broker is shutting down... Simulation: No more future events CloudInformationService: Notify all CloudSim entities for shutting down. CloudDataCenter-1 is shutting down... CloudDataCenter-2 is shutting down... Broker is shutting down... Simulation completed. Simulation completed. Fig. 3: Line Graph Comparison between Existing and Proposed Approach in terms of Security

28 International Journal of Computer Science And Technology www.ijcst.com ISSN : 0976-8491 (Online) | ISSN : 2229-4333 (Print) IJCST Vo l . 6, Iss u e 3, Ju l y - Se p t 2015

CloudAnalyst Cloud Simulator Refrences CloudAnalyst is another cloud simulator that completely GUI [1] Abhay Bhadani, Sanjay Chaudhary,“Performance Evaluation based and support evaluation of social networks tools according of Web Servers using Central Load Balancing Policy over to geographic distribution of users and data centers. Communities Virtual Machines on Cloud”, Proceedings of the Third of users and data centers supporting the social networks are Annual ACM Bangalore Conference, Article No. 16, January characterized and based on their location; parameters such as 2010. user experience while using the social network application and [2] Anthony T.Velte, Toby J.Velte, Robert Eisenpeter,“Cloud load on the data center are obtained/logged. Computing: A Practical Approach”, Tata McGraw-Hill Publishers, 1st Edition, 2009. CloudAnalyst is used to model and analyze the a real world [3] Argha Roy, Diptam Dutta,“Dynamic Load Balancing: problem through a case study of a social networking application Improve efficiency in Cloud Computing”, International deployed on the cloud. Journal of Emerging Research in Management Technology, pp. 78-82, Vol. 2, Issue 4, April 2013. Main Features of CloudAnalyst includes [4] Arzuaga, E., Kaeli, D. R.,Quantifying load imbalance on 1. User Friendly Graphical User Interface (GUI) virtualized enterprise servers", Proceedings of the first joint 2. Simulation with high degree of configurability and WOSP/SIPEW international conference on Performance flexibility engineering, pp. 235–242, 2010. 3. Performing different types of experiments with repetitions [5] Barrie Sosinsky,“Cloud Computing Bible”, Wiley publishers, 4. Connectivity with Java for extension 1st edition, December 2010. [6] Bellur, U., Rao C., Kumar, M.,"Optimal Placement Algorithms GreenCloud Cloud Simulator for Virtual Machines", Proceedings of CoRR, pp.103-110, GreenCloud is also getting fame in the international market 2010. as the Cloud Simulator that can be used for energy-aware [7] Bobroff, N., Kochut, A., Beaty, K.,"Dynamic Placement of cloud computing data centers with the main focus on cloud Virtual Machines for Managing SLA Violations", Proceedings communications. It providers the features for detailed fine-grained of the 10th IFIP/IEEE Symposium on Integrated Network modeling of the energy consumed by the data center IT equipment Management, pp. 119-128, 2007. including servers, communication switches, and communication [8] Che-Lun Hung, Hsiao-hsi Wang, Yu-Chen Hu,“Efficient links. GreenCloud simulator allows researchers to investigate, Load Balancing Algorithm for Cloud Computing Network”, observe, interact and measure the cloud performance for multiple International Conference on Information Science and parameters. The maximum code of GreenCloud is written in C++. Technology (IST 2012), pp. 251-253, April. 28-30, 2012. Inclusion of TCL is also there in the library of GreenCloud. [9] Chandrasekaran, B., Purush, R., Douglas, B., Schmidt, D.,"Virtualization Management Using Microsoft System GreenCloud is an extension of the network simulator ns2 that Center and Dell OpenManage", Dell Power Solutions, pp. is widely used for creating and executing network scenarios. It 40-44, 2007. provides the simulation environment that enable energy-aware [10] Uddalak Chatterjee,“A Study on Efficient Load Balancing cloud computing data centers. GreenCloud mainly focus on the Algorithms in Cloud Computing Environment”, International communications within a cloud. Here all of the processes related Journal of Current Engineering and Technology, pp. 1767- to communication are simulated on packet level. 1770, Vol. 3, December 2013. [11] Vaidehi. M, Rashmi. K. S, Suma. V,"Enhanced Load Conclusion and Future Scope Balancing to Avoid Deadlock in Cloud”, International Journal The cloud based simulators accelerate the research and development of Computer Applications on Advanced Computing and process for analyzing and deep investigation of different parameters Communication Technologies for HPC Applications, pp. including security, energy, integrity, power and related aspects. 31-35, June 2012. Research scholars, scientists as well as engineers can analyze the simulated cloud to compare the impact of their experiments on the Sachin Gupta, Research Scholar, infrastructure rather than using the actual resources. Using a wide Punjab Technical University, variety of free and open source cloud simulators, the engineers Kapurthala is working as a Principal and trainees can work freely with their ideas and algorithms in GPE- Ganpati Group Of Institution, without affecting the actual cloud infrastructure. The existing Bilaspur, Jagadhri, Yamuna Nagar, algorithmic approaches are not effective by which the security can Haryana, India from 01-08-2007. be enhanced. The proposed approach gives optimized cost as well He is pursuing Ph.D. in Computer as the execution time that is directly proportional and related. Applications from Punjab Technical University, Jalandhar,Punjab,India He The work can be enhanced using metaheuristics techniques has Published Two research papers in including International Journal of Computing and • Genetic Algorithms Business Research and one Published • Ant Colony Optimization in International Journal of Computer Science and Technology • Neural Networks [IJCST] (Cosmic Journals) and same presented at International • HoneyBee Algorithm Conference on Advancement in Engineering, Technology & Management at Bangkok, Thailand & Two presented and published in UGC Sponsored One day National Seminar. www.ijcst.com International Journal of Computer Science And Technology 29 IJCST Vo l . 6, Iss u e 3, Ju l y - Se p t 2015 ISSN : 0976-8491 (Online) | ISSN : 2229-4333 (Print)

Dr. S.N.Panda, Ph.D. in Computer Science & Applications From Deptt. of Computer Science, Kurukshetra University Kurukshetra, Haryana (India). He is Currently working as Director Research, Centre of Excellence, Chitkara University, Punjab Campus, Rajpura, Punjab. He has published 52 national/international journals and has published 3 books. He has a Membership in 24 Academic bodies and 03 non-academic bodies. He has 21 years of teaching experience and 8 years of research experience and he is supervising 8 Ph.D. students, 01Ph.D. student has been awarded the degree and 3 Ph.D. students has submitted the thesis.

Dr. Bharat Bhushan received his Doctorate from Kurukshetra University, Kururkshetra. the M Sc (Physics), from Panjab Univ. Chandigarh and M.Sc. (Comp. Sc.), MCA degrees from Guru Jambeshwar University. Respectively. Presently working as Head, Department of Computer Science and Applications, Guru Nanak Khalsa College, Yamuna Nagar (affiliated to Kurukshetra University, Kurukshetra- Haryana, India) and senior most teacher of computer science in Haryana since 1984. He has very vast experience in the field of teaching and research. He is a member of Board of Studies of Computer Science, Kurukshetra University and member of Advisory Board of educational programme (EDUSAT) launched by Govt. of Haryana to impart online education. He has published more than 34 research papers in International and national journals of repute. His research interest includes Software engineering, web mining,, mobile ad hoc networks and Simulation Experiments.

30 International Journal of Computer Science And Technology www.ijcst.com