Design Engineering ISSN: 0011-9342 | Year 2021 Issue: 6 | Pages: 6166- 6173 [6166] Preserving Privacy Using Enhanced Shadow Honeypot Algorithm For Data Retrieval In Cloud Computing Dr.C.Saravanabhavan 1 , Ms.T.Gangalakshmi 2 , P. Ashok 3 , Dr.N.Krishnaveni4 , N.Gopinath 5 1 hodcse@kongunadu.ac.in, 2 gangalakmng97@gmail.com, 4 veniengg@gmail.com 5 gopinath.cse@sairam.edu.in 1 Professor& Head, Department of CSE, Kongunadu College of Engineering and Technology, Trichy, Tamil Nadu, India 2 Assistant Professor, Department of CSE, Vel Tech Rangarajan Dr.Sagunthala R&D Institute of Science and Technology, Chennai, India 3 Assistant Professor, Department of CSE, Sri Sai Ram Institute of Technology, Chennai 4 Assistant Professor, PSR Engineering College, Sivakasi, India 5 Assistant Professor, Department of CSE, Sri Sairam Engineering College, Chennai ______________________________________________________________________________ Abstract Data has been essential to all facets of human life in the last decades. In recent years, the enormous growth of data as a outcome of the development of various applications. This data needs to be protected and stored in locked sites. Cloud computing is the technology can be used to accumulate those immense amounts of data. . The rapid enlargement of this technology makes it more dangerous Therefore, it has become imperative to secure records from attackers to preserve its reliability confidentiality, protection, privacy and actions required for handle it. This paper wished-for anEnhanced Shadow Honeypot Algorithm (ESHA) along with CNN based preprocessing segment of cryptography. As, the data holder requests for the file, the cloud server is then in charge for key generation and to validate this key with user for the intention of authentication. After the provision of key, the file is decrypted using superior Shadow Honeypot algorithm and a decrypted file will be retrieve by the user. At last, the presentation analysis is carried and the comparative examination of existing and proposed techniques is made for proving the future scheme effectiveness. The parameters considered are precision, recall, accuracy, f-measure. Keywords: Enhanced Shadow Honeypot, provision, f-measure, Fuzzy k-means and KDD99