International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249- 8958, Volume-8, Issue-6, August 2019 2728 Published By: Blue Eyes Intelligence Engineering & Sciences Publication Retrieval Number F8395088619/2019©BEIESP DOI: 10.35940/ijeat.F8395.088619 Abstract: The term cloud computing is referred as the shared pool of customizable computer resources and high quantity services which can easily be provisioned with less management endeavours via internet. It transfigured the mode associations reach IT, which enables them to be more perceptive, launch new business models, and minimise the IT costs. These technologies are to be administrated in an interdisciplinary collection of architectures, characterized into various deployment and service models, and can synchronize with other related technologies. The widespread issues with cloud computing are security, reliability, data privacy and anonymity. Cloud computing provides a way to share distributed sources and services that are owned by different organizations or sites. Since it shares distributed resources via network in open environment that results in security issues. In this paper, our aim is to upgrade the security of data in the cloud and also to annihilate the difficulties related to the data security with encipher algorithm. In our proposed plan, some key services of security like authentication and cryptographic techniques are assigned in cloud computing environment. Index Terms: Cloud computing, cryptography, data classification, decryption, encryption. I. INTRODUCTION Cloud Computing is a transpiring virtual distributed environment that utilizes the ideas of sharing, power processing, storing, connectivity, and virtualization. Communicating through broad network i.e., Internet cloud facilitate a large pool of resources, storage media and sharing media that helps to supply on-demand services. This will help the end-users to follow the ideas of distribution, security, elasticity and isolation. Security issues are the foremost difficult problems in cloud domain and the vital hurdle for aggrandize of IT based companies that provide users on-demand services. These security issues can be visualized at application phase, network phase, authentication phase, authorization phase and virtualization phaseThere are two reasons for the security concerns in the cloud computing: Nowadays, many are storing their data on Cloud database. So, the main attention is on the safeguard of user’s data and the vital information shouldn’t get tampered when shifting across the network. It is necessary that Integrity, Revised Manuscript Received on August 25, 2019 Adnaan Arbaaz Ahmed, Scholar, Department of Information Technology, Guru Nanak Institutions Technical Campus, Hyderabad, India. Dr.M.I.Thariq Hussan, Professor & Head, Department of Information Technology, Guru Nanak Institutions Technical Campus, Hyderabad, India. Venkateswarlu Bollapalli, Assistant Professor, Department of Information Technology, Guru Nanak Institutions Technical Campus, Hyderabad, India. Confidentiality and Availability of user data must be ensured. The unauthenticated user tries to access the authenticated user’s data. We can apply cryptographic algorithms in cloud servers to solve these threats. However when a user is revoked, usage of a single cryptographic algorithm is not adequate to assure the security of data and to manage the Access Control methods in Cloud Computing environment. For data security these techniques are applied on encryption. Encrypting complete data can turn to be very expensive in terms of memory as well as for time. So, to solve this problem it would be better if we first separate our sensitive data and then apply encryption algorithms. It would address reliable results if we reorganize the data depending to its confidentiality level. In machine learning field, the data classification is a method of distinguishing the category of unclassified data sample set with the help of build classifier. The classifier is constructed by constructing a training set of familiar data samples. To dsevelop an appropriate classifier, large range of justified training data samples are required. This advancement invites a new paradigm of services where data classification is offered by servers in a cloud to its various clients/users. Specifically, the server will process the data automatically and hence, cat egorise the client’s data samples present on remote private servers. However un-trusted third party-servers can access the private data. Moreover, any vital detail or training data set specifications may not be disclosed by the servers even if it provides the classification services to its client. Thus, a mechanism that ensures the privacy of the server’s training set and client data samples is required. Therefore, a decipher model is essential to forestall the invalidated user from accessing the enciphered information as well as to produce authentic keys for validated users. II. INTENTION OF PROPOSED SYSTEM To design a system which can render privacy and security in terms of cloud storage. To collocate an encipher depended environment for protecting the confidential data on the Cloud and to architect how the user and the storage service provider performs operations on enciphered data. To design an architecture where a user can be able to store the data on the Cloud in the encrypted form which is not vulnerable. (In normal cases in Cloud Computing, the data which is stored on the Cloud Upgrade-Data Security in Cloud by Machine Learning and Cryptography Techniques Adnaan Arbaaz Ahmed, M.I.Thariq Hussan, Venkateswarlu Bollapalli