International Journal of Research Publication and Reviews Vol (1) Issue (8) (2020) Page 1-11 International Journal of Research Publication and Reviews Journal homepage: www.ijrpr.com * Corresponding author. E-mail address: pbhargavirevathi@gmail.com Providing Key Exposure to Enabling the Cloud Data Service Security P.Bhargavi*, D.Murali, M.V. Ramesh Brahmaiah College of Engineering, Nellore, INDIA A B S T R A C T With the popularity of cloud computing, mobile devices can store/retrieve personal data from anywhere at any time. Consequently, the data security problem in mobile cloud becomes more and more severe and prevents further development of mobile cloud. There are substantial studies that have been conducted to improve the cloud security. However, most of them are not applicable for mobile cloud since mobile devices only have limited computing resources and power. Solutions with low computational overhead are in great need for mobile cloud applications. In this paper, we propose a lightweight data sharing scheme (LDSS) for mobile cloud computing. It adopts CP-ABE, an access control technology used in normal cloud environment, but changes the structure of access control tree to make it suitable for mobile cloud environments. Keywords: Cloud computing, data security, lightweight data sharing scheme 1. Introduction Distributed storage evaluating is seen as an essential administration to check the honesty of the data publically cloud. Current evaluating conventions territory unit all bolstered the customer's mystery key for examining is totally secure. In any case, such suspicion may not persistently be charge, because of the probably frail feeling that all is well with the world and additionally low security settings at the shopper. We formalize the definition and along these lines the security model of examining convention with key-presentation versatility and propose such a convention. In our style, we tend to utilize the parallel tree structure and in this manner prearrange traversal strategy to refresh the key keys for the shopper. Fig: 1.1 Cloud Computing Architecture.