International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 8958, Volume-8 Issue-6, August 2019 3235 Published By: Blue Eyes Intelligence Engineering & Sciences Publication Retrieval Number F8831088619/2019©BEIESP DOI: 10.35940/ijeat.F8831.088619 Abstract: In this paper an efficient secure cloud computing framework has been developed. This framework consists of data grouping based on fuzzy c-means (FCM). It has been used for the individual and associative rankings of uploaded text data on the cloud. For the decision selection ranking of the data simple additive weighting (SAW) method have been used. For data security RC6, RSA and AES algorithms have been used collectively and individually based on the condition. RC6, AES and RSA algorithms have been used as a combination for the complex key security. Based on the decision performance ranking top higher rank which supports are >=50% adopted all the three security algorithms, only one key is applied for the remaining data. The maximum number of keys applied is 5 but there are total three key variants mainly applicable. So we have considered three keys. It has been clear from our results that the keys spreading are automatically increased on the basis of number of files. So in case of high risk the keys are increased automatically and applied. Keywords: FCM, RC6, AES, RSA. I. INTRODUCTION In today’s era the services which have been accessible easily by cloud computing on demand with the ease of applicability and reduced cost [1−3]. It has been fulfilled based on the resource requirement and the systems conditions and applicability [4, 5]. The ease of applicability and business performances makes this platform very suitable in current era [6−10]. There are several protocols and applications which have been used widely with these applications. These protocols can be helpful in different communication scenario with the help of data aggregation and specialization. Figure 1 shows the cloud computing resources. The main motivation of our paper is to provide an efficient security protocol for the cloud user authentication and data aggregation at the time of data communication. The communication scenario is mainly affected by the security threats in the cloud computing environment. The paper objectives are as follows: 1. To provide data categorization for the purpose of data separation and aggregation in cloud computing environment for the purpose of secure communication. 2. To apply decision making process for the security requirement checking in the way that it can be cope the security needs. 3. To apply the separations of the security needs for the concurrent crypto system application and adaptions. 4. To apply data key hybridization for the requirement of Revised Manuscript Received on August 25, 2019. * Correspondence Author Dheresh Soni*, Research Scholar, Mewar University, Chittorgarh, Rajasthan. M. Kumar, Retired Professor, MANIT, Bhopal, India. complex security system for the cloud data also. Figure 1 cloud computing resources II. RELATED WORK In 2018, Surbiryala and Rong [11] discussed the involvement of cloud computing in case of individuals and organizations. They have suggested that the important factors for using the cloud computing platform are low costs, computational power, and storage services over the Internet. They have suggested the main specialty is the data recovery, according to the authors it is the backbone. They have suggested that the confidential data can be recovered even if the data is deleted. They have discussed the security concerns based on the tools used for recovery in the cloud computing environment. They have proposed a rename method. In 2018, Bharadwaj et al. [12] discussed the operation ability of the cloud computing environment. They have suggested that like other technology there are also several security risks in cloud computing. They have explored security related issue in cloud computing. They have investigated in the direction of dynamic cloud environment and provides different solutions for the real time challenges. In 2018, Chandel et al. [13] discussed the enterprise cloud technology and data storage services. They have suggested that due to the security issue several companies do not trust for their sensitive data. They have discussed on the exponential growth of the cloudbased services in China focusing the security concern and applicability. They have also discussed the risk and challenges. In 2019, Koo et al. [14] discussed security issue in cloud computing. They have suggested that the current security system is not sufficient for the national defense information system. They have suggested the need of security architecture based on cloud computing for the national defense command control system. They have also analyzed the U.S. military Cloud Resouces Data managem ent Adaptati on Resource sharing Query Data Aggregatio n An automated cloud security framework based on FCM in user-cloud environment Dheresh Soni, M. Kumar