Cloud computing is rising as a prevailing information interactive paradigm to appreciate users information remotely keep in an internet cloud server. Cloud services offer nice conveniences for the users to fancy the on-demand cloud applications while not considering the native infrastructure limitations. throughout the information accessing, completely different users is also in a very cooperative relationship, and so information sharing becomes important to attain productive edges. however security and privacy problems have become key considerations in information sharing among the multiple users in cloud storage. so as to avoid of these things, a system is projected during which a shared authority primarily based privacy-preserving authentication protocol (SecCloud) to resolve privacy and security issue for cloud storage.. Keywords: Cloud computing, privacy preservation, shared authority, AES Algorithm.
I.INTRODUCTION Cloud services offer nice readiness for the users to fancy the on-demand cloud applications while not considering the native infrastructure limitations. throughout the information accessing, completely different users is also in a very cooperative relationship, and so information sharing becomes glowing to attain productive edges. the prevailing security solutions in the main specialize in the authentication to appreciate that a user's privative information cannot be unauthorized accessed, however neglect a refined privacy issue throughout a user difficult the cloud server to request different users for information sharing. The challenged access request itself might reveal the user's privacy despite whether or not or not it will get the information access permissions. many schemes using attribute-based encoding (SecCloud) are projected for access management of outsourced information in cloud computing. It allows customers with restricted procedure resources to source their massive computation workloads to the cloud, and economically fancy the large procedure power, bandwidth, storage, and even acceptable package which will be shared in a very payper-use manner. Despite the tremendous edges, security is that the primary obstacle that stops the wide adoption of this promising computing model, particularly for patrons once their confidential information square measure consumed and made throughout the computation. To combat against unauthorized data leak, sensitive information need to be encrypted before outsourcing thus on offer finish to-finish information confidentiality assurance within the cloud and on the far side. However, standard encryption techniques in essence forestall cloud from activity any significant operation of the underlying cipher text-policy, creating the computation over encrypted information a really exhausting downside. The projected theme not solely achieves quantifiability attributable to its hierarchical data structure. As a result, there do exist varied motivations for cloud server to behave undependably and to come incorrect results, i.e., they will behave on th...