Copyright © 2016 Authors. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. International Journal of Engineering & Technology, 7 (2.20) (2018) 236-242 International Journal of Engineering & Technology Website: www.sciencepubco.com/index.php/IJET Research paper A Two Way Validation Framework for Cloud Storage Security Anantula Jyothi 1 *, Baddam Indira 2 1 Asst.Prof., Anurag Group of Institutions. 2 Assoc.Prof., Kasturba Gandhi Degree and PG College. E-mail:Indira.baddam@gmail.com *Corresponding author E-mail:jyothianantula@gmail.com Abstract High Performance Computing (HPC) has become one of the predominant techniques for processing the large scale applications. Cloud environment has been chosen to provide the required services and to process these high demand applications. Management of such applications challenges us on three major things i.e. network feasibility, computational feasibility and data security. Several research endeavours are focused on network load and computing cloud date and provided better outcomes. Still those approaches are not able to provide standard mechanisms in view of data security. On the other side, research towards enabling the auditing features on the cloud based data by various researchers has been addressed but their performance is poor. However, the complexity of the audit process proven to be the bottleneck in improving performance of the application as it consumes the computational resources of the same application. Henceforth, this work proposes a novel framework for cloud data auditing at multiple levels to audit the access requests and upon validating the conditions of one level, the connection request will be moved to the further complex levels in order to reduce the computational loads. The proposed framework determines a substantial reduction in the computational load on the cloud server, thus improves the application performance leveraging the infrastructure use. Keywords: Cloud storage, cost reduction, data auditing, Data security, framework. 1. Introduction In the recent development, the growth in cloud computing in technical, business and research prospective is the point of focus. The majority of the organizations have adopted benefits from cloud computing such as efficient deployment and management of the services, agility of the business cases for DCO oriented cases, uptime of the services and customer satisfaction. The work of Marston et al. [1] has demonstrated the benefits to be achieved for business cases and the work of M. A. Vouk et al. [2] has proven the research significance of cloud computing. The massive growth is been observed in case of software as a service scenarios. Thus the evaluation of healthcare as a service as demonstrated by A. K. Jha et al. [3] and also finance as a service as demonstrated by H. T. Peng et al. [4] showcased the modernization of the regular soft- ware on cloud away from the contemporary usages. Not alone for the business or commercial spaces, the benefits have also reached to the education domain as well. The case study by the M. Mircea et al. [5] has shown the new paradigm of education as a service. Nevertheless, this growth in the cloud computing has made the industry, consumers and the researchers to think about the contingency of these adoptions of cloud computing. Various researchers have expressed their researches and works in order to decide the best possible security features of the cloud computing. However, the challenge in deploying the security protocols on cloud is to identify the accurate abode. Multiple opinions from research attempts have shown multiple benefits and flaws of deploying the cloud security at service providers’ end or at consumers end or the end of cloud data centres. The work by M. Armbrust et al. [6] presented a decent survey of the existing security measures and the work by L. Liu et al. [7] contributed significantly in identifying the security policies to be adopted for social applications. In the other hand the findings by T. Mather et al. [8] proven that the security expectations for enterprise applications are different from the other aspects. As realized the deployment of cloud security protocols can only be justified by considering the fundamental purpose of the application. Nonetheless, the focus of this work is to analyse and propose the security measures for data on cloud computing. Thus this work proposes the security deployments on cloud data centres. The primary challenge of the data centres are the continuous growth in the data in gigantic and exponential rate as showcased by M. Pop et al. [9] and M V Narayana et.al[23]. The elaboration of this issue is highly analysed and also forecasted in the work by A. Greenberg et al. [10] and Q. Zhang et al. [11]. Henceforth, the challenges identified as The inclusion of the security policies must not be done in the application level as the in order to estimate the performance of the cloud services must be carried out separately and spe- cifically. The traditional security policies for verification must be re- vamped as the existing policies can be vulnerable to the hackers. Access of the data is provided to the data centre owners or the consumers or the service providers or the data auditors. The specific access policies by be rooted in the security poli- cies. Finally, the inclusion of the security policies from the data centre end must incorporate the verifications of the access re- quests from data centre controllers, service owners, consum- ers and most importantly the data auditors.