International Journal of Data Informatics and Intelligent computing (IJDIIC) Vol. 2, No. 1, March 2023, pp. 11~31 DOI: 10.5281/zenodo.7766567 Journal homepage: https://www.ijdiic.com 11 Information Security: A Coordinated Strategy to Guarantee Data Security in Cloud Computing Kofi Immanuel Jones 1 , R. Suchithra 1 1 Department Computer Science and Information Technology, Jain University, Bengaluru, Karnataka, India Article Info ABSTRACT Article history: Received November 27, 2022 Revised January 02, 2023 Accepted February 10, 2023 This paper discusses different techniques and specialized procedures which can be used to effectively protect data from the owner to the cloud and then to the user. The next step involves categorizing the data using three encryption parameters provided by the user, which are Integrity, Availability, and Confidentiality (IAC). The data is secured through various methods such as SSL and MAC protocols to ensure data integrity checks, searchable encryption, and splitting the data into three parts for cloud storage. Dividing the data into three portions not only enhances security but also facilitates easier access. Access to the encrypted data requires the user to provide the login information and password of the owner. This paper also studies critical security issues like unauthorized servers, brute force attacks, threats from cloud service providers, and loss of user identity and password. Keywords: Cloud Security Encryption Message authentication code Virtualization Secured socket layer This is an open access article under the CC BY-SA license. Corresponding Author: Kofi Immanuel Jones Computer Science and Information Technology Jain University Bangalore, India Email: kofijones37@gmail.com 1. INTRODUCTION Modern businesses rely heavily on networks and communication infrastructure to transmit important and confidential information. As a result, it is crucial to ensure that such information is appropriately handled and secured. This makes the priority of protecting business and operations more important. Information security can be described as the manner of protecting the information, the system that has been put in place, and the hardware that has been used to store, used, and transmit the information in other to ensure the integrity, confidentiality, and availability of data and to make sure that operating procedures are protected[1]. Many businesses, particularly small and medium-sized ones, have come to understand the advantages of moving their applications to the cloud. The introduction of cloud computing technology has enabled many businesses to build and deploy software more efficiently and effectively in the cloud, saving money on the expense of buying and maintaining the infrastructure. "Cloud computing" is a concept for instant, on-demand network access to a pool of programmable computing resources (including networks, servers, storage, applications, and services). It makes it possible for these resources to be quickly provisioned and released with minimum administrative effort or service provider involvement[2]. This research project has been set up by combining several methodologies and using them to carry out the mission of cloud data security. The combination of these techniques acts as a wall against the security issues that have been continuously causing gaps in the effective operation and expansion of the cloud. This model's description offers a comprehensive perspective of how the data is processed at various stages. The way in which this model is defined gives a thorough overview of how data processing works at various levels. Data transferred to the cloud is encrypted because encryption is the model's primary fundamental protection strategy. Data is encrypted when it is transformed into cipher text, a form that is difficult for