Journal of Computer Science and Applications. ISSN 2231-1270 Volume 7, Number 1 (2015), pp. 39-44 © International Research Publication House http://www.irphouse.com A Novel Frame Work For Cloud Computing Security By Using Abe P.Srinivas Kumar and Dr S.Venkateswarlu M.Tech, Department of CSE, Vaddeswaram, Gunture Professor, Department of CSE, Vaddeswaram, Guntur Abstract: Cloud computing is a revolutionary computing ensample, which enables ductile, on demand, and low cost usage of computing collateral, but the data is redistribute to some cloud servers, and various seclusion deportment disembark from it. Various pragmatic based on the attribute-based engraving have been proposed to defended the cloud storage. However, most work limelight on the data contents privacy and the access control, while less attention is paid to the concession control and the coherence privacy. In this paper, we extant a semi anonymous appendage control contrivance AnonyContprivacyrol to address not only the dossier concealment, but also the user identity concealment in existing connection control contrivance. Anony Control apportions the central jurisdiction to limit the identity gush and thus enact semi anonymous. Besides, it also theorize the file access control to the privilege control, by which privileges of all operations on the cloud data can be managed in a fine-grained idiosyncrasy. Consequently, we present the AnonyControl-F, which fully prevents the coherence effusion and dispatch the full anonymity. Our security dissection shows that both Anony Control and Anony Control-F are impenetrable under the arbitrational bilinear DiffieHellman assumption. Index TermsCloud computing, DepSky, Secret Sharing algorithm, LaGrange‟s basis polynomial, multi-clouds and ABE(Attribute based encryption). I. INTRODUCTION Cloud computing in its most righteous form can be called the next generation of computer technology. Cloud computing offers limitless complaisance, better reliability, aggrandize collaboration, portability, full-blown storage but how