www.rspsciencehub.com Volume 03 Issue 02S February 2021 International Research Journal on Advanced Science Hub (IRJASH) 49 Special Issue of Second International Conference on Science and Technology (ICOST 2021) Proxy-Oriented Multiple File Uploading and Integrity Checking of files in Multi-Cloud Environment Toomula Srilatha Assistant Professor, Department of Computer Science, R.B.V.R.R Women’s College, (Autonomous), Narayanaguda, Hyderabad Toomula.srilatha@gmail.com Abstract Cloud servers have become an option for the organizations to store their files and data. Security in the hybrid and multi-cloud environment is always a challenge to be considered. Client can access the cloud servers to upload the files and documents. In a particular time, when cloud servers restrict access to client for storing the files, then the client can assign its proxy to process the files and upload them. Contrarily, integrity checking is also a significant security issue. It allows customers to verify if their outsourced data is kept intact without the entire data being downloaded. In Hybrid and Multi Cloud environments, a new proxy-oriented multiple file uploading and integrity checking model is proposed to resolve security problems. This concrete safety protocol is built with the aid in the Multi-Cloud Environment. Keywords:Cloud Servers, Security, Hybrid Cloud, Multi Cloud 1. Introduction Security is a critical factor to be considered and it is an essential factor in the Cloud environment. The area includes all processes and procedures that protect computer-based software, data and resources from accidental or unwanted entry, modification or damage. Defence against unplanned incidents and even natural disasters often require protection. Protection can be described as techniques to ensure that no individuals can read or compromise data stored in a computer without authorization. Secure computing is needed factor in ongoing cloud services. Most of the computer security measures involve data encryption and passwords. 1.1 Benefits of secure computing: Protecting our archives and documents Protects the reputation of users Protects the credibility of the user Protecting group purchases Protects investments from organizations 2. Literature Survey Secure computing [1]in the cloud is the need of the hour in today’s business world. The concept of security is playing a very important role in cloud computing. A large volume of storage is outsourced by the data controllers of separate companies to the cloud. Cloud adoption has motivated companies to leverage large-scale computing tools and save money. The confidential data should be encrypted by the owner prior to outsourcing to maintain data protection, which allows the conventional and powerful plaintext keyword search methodology point-less. A [1] realistic, effective, and scalable searchable encryption method is proposed that supports both ranking search for multi-keywords and concurrent search. Vector Space Model (VSM) is used to construct the searchable index to generate correct search results in order to facilitate multi-keyword search and result relevance ranking. In cloud storage [2], data security approaches like data