Enhancing Two Standard Privacy Preserving to Improve the Security Policy in Cloud Environment Komarasamy G & Vivek V Department of Computer Science and Engineering School of Engineering and Technology JGI Global Campus, Jain University, Bangalore, Karnataka, India Email: vivek544@hotmail.com Abstract - Cloud computing is emerging computing model where the data owners are outsourcing their data into the cloud storage. By outsourcing the data files into the cloud, it gives many benefits to the large enterprises as well as individual users for accessing database security. In data base Storage management systems to cloud it still faces a number of fundamental and critical challenges, among which storage space and security is the top concern. We consider the problem of processing range query search over a confidential numeric attribute K in an outsourced setting of cloud computing. To ensure the correctness of user and user’s data in the cloud, we propose a multilevel round random key policy third party authentication system in crypto policy standard. In addition to simplified data storage and secure data acquisition. Also, we consider processing range query search over a confidential numeric attribute with two main challenges. First, the confidentiality requires hiding the value and the relative order of the attribute in records from the cloud server. Finally, we will perform security and performance analysis which shows that the proposed scheme is highly efficient for maintaining secure data storage and acquisition. Keywords: Acquisition, cloud, random key, confidentiality, outsourcing. I. INTRODUCTION 1.1 Cloud Computing Cloud computing is a rising processing model in which assets of the registering interchanges are given as administrations over the Internet. This paper proposed a few administrations for information security and access control when clients outsource delicate information for sharing on cloud servers. This paper tends to this testing open issue by, on one hand, characterizing and upholding access arrangements in light of information properties, and, then again, enabling the information proprietor to relegate the greaterpart of the calculation errands engaged with fine grained information get to control to un-trusted cloud servers without unveiling the fundamental information substance. Broad examination demonstrates that our proposed conspire is very effective and likely secures under existing security models. So as to address this new issue and further accomplish a protected and tried and true distributed storage benefit. The web is usually imagined as mists henceforth the expression "distributed computing" for calculation done through the web. With distributed computing clients can get to database assets by means of the web from anyplace, for whatever length of time that they require, without stressing over any support or administration of genuine assets. Plus, databases in cloud are extremely powerful and adaptable. Distributed computing is dissimilar to matrix figuring, utility registering, or autonomic processing. Truth be told, it is an exceptionally free stage as far as figuring. 1.2 Types of Cloud and Services Private cloud: In this model, the cloud supplier gives cloud foundation to a solitary association that has numerous shoppers. This framework is to be utilized solely for their utilization and need. The proprietor, supervisor, and administrator of this cloud could be simply the association, an outsider, or the association and outsider together. This private cloud could be on premises or off premises. Community Cloud: In this model, the cloud supplier gives cloud foundation to a solitary association that has numerous shoppers. This framework is to be utilized solely for their utilization and need. The proprietor, supervisor, and administrator of this cloud could be simply the association, an outsider, or the association and outsider together. This private cloud could be on premises or off premises. Public Cloud: This model contrasts from the past model in that it is open for general society it isn't private and not only for group. In this model, an open cloud can be provisioned for open to utilize it to fulfill their necessities. The proprietor, administrator, and administrator of this cloud could be an administration, private association, a business or scholastic association, and in some cases a considerable lot of them can be in one cloud and get the administration from a similar supplier. Hybrid Cloud: This model involves at least two organization models (private, group, or open). The cloud foundation can be mix of those models. Server farm inside an association, private cloud, and open cloud can be consolidated keeping in mind the IJSMS DOI: 10.24178/ijsms.2018.3.3.08 International Journal of System Modeling and Simulation (ISSN Online: 2518-0959) IJSMS Vol 3(3) Sep 2018 This is an open access article under the CC BY-SA 4.0 license (https://creativecommons.org/licenses/by-sa/4.0/) 8