Madhu B R et al, International Journal of Computer Science and Mobile Computing, Vol.8 Issue.6, June- 2019, pg. 95-99 © 2019, IJCSMC All Rights Reserved 95 Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320088X IMPACT FACTOR: 6.199 IJCSMC, Vol. 8, Issue. 6, June 2019, pg.95 99 SECURE DATA SHARING ON CLOUD USING TRANSPARENCY SERVICE MODEL Madhu B R; M Sindhu; H A Aravinda; Aishwarya S; Nesara A M Department of Computer Science and Engineering School of Engineering and Technology, Jain University, Bangalore, Karnataka, India AbstractCloud technology enables data-sharing capabilities, which benefits the user through greater productivity and efficiency. However, the Cloud is susceptible to many privacy and security vulnerabilities. Thus, there is a strong demand for data owners to not only ensure that their data kept private and secure in the Cloud, but also have control over their own data. If meta-data is compromised, then unapproved access to the client data is possible. For the protection of client data, we present a Transparency Service Model in this research project. TSM provides a mechanism where cloud provider configures the service on the cloud by giving the service information about the cloud storage devices that would contain the data. It is then responsibility of the TSM to store data on those devices and cloud provider no longer has direct access to data storage on those devices. KeywordsTransparency service model, IaaS (Infrastructure as a service), Cloud service provider I. INTRODUCTION Today cloud computing has emerged as a field of great innovation in the computer world. Still various issues persist in this field with data security and data privacy. This is because; the cloud provider has access to the data and monitors the client’s information. Due to this reason, the data owners strongly demand to keep their data private and secure on the cloud. The users also desire to have control over the data contents that they share with other users. Therefore, it becomes necessary to have a cryptographically enhanced access control over the shared data. For the protection of client data, we present a Transparency Service Model in this research project. TSM provides a mechanism where cloud provider configures the service on the cloud by giving the service information about the cloud storage devices that would exist the data. It is then responsibility of the TSM to store data on those devices and cloud providers no longer direct access to data storage on those devices. The cloud system has various security threats and risks. Few of which are mentioned below: i. Malware Injection: With this threat, the exploiters try to inject malicious programs, codes or services in the cloud. ii. Spoofing: It is another type of attack mainly used to spoof Meta data information. iii. Service Hijacking: In this thread the hackers can hack into a web service hosted on the cloud and install malicious software to get valuable user data and information. iv. Threat from Insiders, Shared Resource Problems, Vulnerabilities, Access Control