Copyright © 2018 Authors. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. International Journal of Engineering &Technology, 7 (3.12) (2018) 661-665 International Journal of Engineering & Technology Website: www.sciencepubco.com/index.php/IJET Research paper An Efficient Approach for Secure Storage, Search using AES in Cloud Storage P Anjaiah 1 , C. Raghavendra 2 , K. Rajendra Prasad 3 1, 2, 3 CSE Department, Institute of Aeronautical Engineering, Hyderabad *Corresponding Author E-mail: crg.svch@gmail.com Abstract The expanded rate of development and adaption of distributed computing, day by day, more delicate data is being brought together onto the cloud. For the security of profitable data, the information must be encoded before externalization. The current inquiry procedures enable the client to seek over encoded information utilizing keyword yet these methods represent just correct hunt. There is no resilience for grammatical errors and organization irregularities which are typical client conduct. This makes compelling information stockpiling and use an exceptionally difficult errand, providing client seeking extremely baffling and wasteful. In this paper, we concentrate on secure capacity utilizing Advanced Encryption Standard (AES) and data recovery by performing Fuzzysearch on information which is scrambled while transferring on the cloud. We are proposing the execution of a progressed Fuzzykeywordtechnique called the Wildcard based procedures which restores the coordinating records when clients seeking inputs definitely coordinate the predefined keyword or the nearest conceivable coordinating documents in light of likeness catchphrase semantics when correct match comes up short. In the proposed method, using alter separation to measure keywords similitude and build up a proficient strategies for developing fuzzy keyword sets, which concentrate on diminishing the capacity and portrayal overtop. Keywords: Fuzzy inquiry, encryption on cloud, distributed computing, AES, trump card. 1. Introduction Distributed computing is a fundamental stage for sharing assets. This sharing of assets depends on three models: Infrastructure-as- a-benefit (IaaS), Platform-as-a-benefit (PaaS), Software-as-a- benefit (SaaS).These administrations are tweaked according to client request. Distributed computing all the more ideally alluded as "the cloud", likewise concentrates on expanding the adequacy of shared assets. Typically cloud assets are shared by numerous clients as well as reallocated according to the client request. The capacity of information on cloud decreases the weight of capacity and upkeep of information on the client. Considering this colossal development of touchy data on cloud, cloud security is of indispensable significance for endeavours. The way that the data proprietors and merchant provisioned cloud servers are not a piece of the same trusted space may put the outsourced information in danger. This development of cloud servers are not a piece of the same trusted area may put the outsourced information in danger. This development of cloud benefit clients has shockingly been went with a development in pernicious movement in cloud. An ever increasing number of vulnerabilities are being examined consistently. A large number of clients are subscribing to the cloud based administrations, in this way wellbeing and security of these administrations are of most extreme significance. The eventual fate of cloud, considerably more in growing scope of utilizations, includes a substantially more profound degree confirmation and protection. Proposed here is a straightforward information insurance display where information is scrambled utilizing Advanced Encryption Standard (AES) before it is propelled into the cloud, accordingly guaranteeing information secrecy and security. To guarantee security amid data recovery, we are utilizing an accessible encryption mechanism.in a standard accessible encryption plot, a file is made for each catchphrase of intrigue and it is related with the documents that contain the keyword. The trapdoors of the keyword are incorporated with the list data, accordingly powerful catchphrase look is acknowledged without trading off document content. During a time of wise inquiry frameworks, the standard accessible encryption plot supporting a correct catchphrase coordinate is conflicting with easygoing client look practices. Typical client seek inquiries will have grammatical errors and portrayal inconsistencies which may not coordinate the pre-set keyword strings. A client looking for "APPLE" can inadvertently sort "APLE" and someone else may question for "P.O.BOX" on the grounds that he is insensible about the put away keyword. In this manner, we move our attention on empowering viable protection safeguarding Fuzzy catchphrase look for data put away in cloud situations. Fuzzykeywords seek expands framework convenience by restoring the coordinating documents when clients looking information sources precisely coordinate the pre- characterized keyword or the nearest conceivable coordinating records in light of keyword similitude semantics, when correct match fizzles. Alter remove is utilized to measure keyword likeness and for the improvement of the novel strategy, i.e., a special case based system, for developing Fuzzykeyword sets. This procedure disposes of the requirement for tallying all the Fuzzykeyword and the aggregate size of the Fuzzykeywords set is fundamentally diminishes.