International Journal of Science and Research (IJSR) ISSN: 2319-7064 SJIF (2019): 7.583 Volume 9 Issue 12, December 2020 www.ijsr.net Licensed Under Creative Commons Attribution CC BY A Secure Code Based Storage System in Cloud Dr. K. Karuppasamy 1 , Margret Sharmila 2 1 Professor & Head, RVS College of Engineering and Technology, Coimbatore, India margretsharmilait[at]gmail.com 2 Assistant Professor, SNS College of Engineering, Coimbatore, Tamil Nadu, India Abstract: The characteristics of intrinsic information sharing and low maintenance, provides a more robust utilization of resources. In cloud computing, cloud service suppliers provide associate degree abstraction of infinite cupboard space for shoppers to host information. It will facilitate shoppers scale back their money overhead of information managements by migrating the native managements system into cloud servers. However, security issues become the most constraint as we have a tendency to currently source the storage of information that is probably sensitive, to cloud suppliers. To preserve information privacy, a typical approach is to inscribe information files before the shoppers transfer the encrypted information into the cloud. It is tough to style a secure and economical information sharing theme, for dynamic teams within the cloud. and encrypting every file group with a file- block key. However, the file-block keys have to be compelled to be updated and distributed for a user revocation, here for; the system had a significant key distribution overhead. Alternative schemes for information sharing on un-trusted servers are planned. However, the complexities of user participation and revocation in these schemes square measure linearly increasing with the quantity of information house owners and also the revoked users. Keywords: Data security, Encryption 1. Introduction The project deals with the network security of cloud that provides an enhanced data sharing and protects the data from the hackers. The project focuses mainly on Network Security Existing System The untrusted data sharing have been proposed in this the encrypted data files are stored by the data owners and the respective decryption keys are distributed to the authorized users. The content of the files cannot be earn by the unauthorized users as they have no knowledge of the decryption keys. The Complexities and revocation is increased. Hence proposed a secure scheme which is based on encryption techniques, it allows the sharing of data between the groups. In the key policy attribute based encryption any user can share and store the data 2. Literature Survey The fine-grained data owner-side access control in public cloud storage is dishonest. Attribute-based Encryption(ABE) is introduced. Among ABE schemes, CP-ABE is practical in public cloud storage, in which the ciphertext is encrypted under an access policy and only users whose attributes satisfy the access policy can decrypt the ciphertext. Subsequently, many variants and relevant protocols] have been proposed to make CP- ABE more suitable for real scenarios with rich functionalities and security properties in public cloud storage. The cryptography-driven access control does not protect the cloud provider against many other attacks. Since the cloud provider does not conduct the access control, it cannot stop those unauthorized users. One attack that is originated from this limitation is Distributed Denial of Services (DDoS). The power of DDoS attacks has been showed to incur significant resource consumption in CPU, memory, I/O, and network. The attacks can exist in public clouds. In, the limitation of cloud-side static resource allocation model is analyzed, including the risk of Economic Denial of Sustainability (EDoS) attacks, which is the case of DDoS attacks in the cloud setting in, or the Fraudulent Resource Consumption (FRC) attack in. These attacks are intended to break the budget of public cloud customers. Some existing works try to mitigate EDoS attacks. In, the authors proposed a mitigation technique by verifying whether a request comes from a cloud user or is generated by bots. Some existing works discuss the necessary of accounting resource consumption in the public cloud arouses some concerns. In the literature, the authors discussed key issues and challenges about how to achieve accountability in cloud computing. In the literature, the authors surveyed existing accounting and accountability in content distribution architectures. In the literatures and the authors respectively proposed a systematic approach for verifiable resource accounting in cloud computing. However, the accounting approach involves changes to the system model, and requires the anonymous verification of users, which is not supported in previous systems. Compared with relevant schemes, our approach works on the protocol level to provide the resource verifiability that relies on authorized users who satisfy the CP-ABE policy, and achieves the covert security which is more practical and secure. 3. Problem Statement In the existing system Company use a single server to store and retrieve the data from the cloud. In this existing System there is a possibility of Hacking the data by unauthorized person. There are no safe security mechanisms to transmitting data communication in the existing system 4. Objective The objective of this project is to satisfy the data robustness, confidentiality and forwarding of data through tight integration which makes an efficient storage. This performs encoding and partial decryption process Paper ID: SR201201122225 DOI: 10.21275/SR201201122225 285