I.J. Information Engineering and Electronic Business, 2017, 1, 10-19 Published Online January 2017 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijieeb.2017.01.02 Copyright © 2017 MECS I.J. Information Engineering and Electronic Business, 2017, 1, 10-19 Entity Based Distinctive Secure Storage and Control Enhancement in Cloud Divesh Kumar Computer Science and Engineering Department, Eternal University, Himachal Pradesh, 173101 India Email: diveshkumar16solan@gmail.com Amit Sharma Computer Science and Engineering Department, Eternal University, Himachal Pradesh, 173101 India Email: er.amit016@gmail.com Surjan Singh Mathematics Department, Eternal University, Himachal Pradesh, 173101 India Email: surjan.singhbhu@gmail.com AbstractCloud computing acts as rising evolution in Information Technology (IT), boosting the delivery of services and eye-catching returns to its tenants enrolled at low costs of per usage basis. Cloud computing means “everywhere” and provides enormous available resources via internet with ensured quality. With the numerous profits involved, it clears the viewpoint of various businesses to invest in cloud services for accomplishment of their needs in the cloud habitat. Cloud enables computing resources in a service oriented flair instead of burden with lags in traditional setup of unified architecture. With delivery of cloud services occur many obstacles in the cloud to work securely without downfall in its performance. Security has always emerged as a long handed concern with its progression which affects its virtuous implementation. We commence with aspect of security based on parameters named Confidentiality (C), Integrity (I) and Granular Access (GA) and then sent over a secure channel via Secure File Transfer Protocol (SFTP) for secure storage with Elliptic Curve Cryptography (ECC) encryption laid on data. Secure Hash Algorithm (SHA) is used for hash value generation maintaining integrity. The authentication mechanism of secure Graphical One Time Password (GOTPass) provides high end to end security for retrieval process and boost security appliance for data. Data is divided into three security levels as per Secure Quality Index (SQI) generated and storage is isolated to have different security aspects. It provides supplemental controlled security and data protection as associated with the file. User is responsive to pass all security mechanisms to gain access. Index TermsEncryption, Security, Access Control I. INTRODUCTION Cloud term means internet service facilities, deals with non-local storage for user data on the basis of pay per use. Cloud evolved with other services like computing with different operating platforms, software, technology infrastructure and storage online at the remote locations. These combine to cater the demands of the users and are effectively optimized to conserve costs. Therefore, it provided more scalability and flexibility in terms of resource availability and cost effectiveness on demand basis rather than the traditionally used Information Technology (IT) infrastructure. Cloud computing plays a major role in the changed face of new technological advancements. It increases the scope of improvement in relation to nearly all fields of technology directly or indirectly. With the emerging technologies, users can access the resources anytime, anywhere and anyplace giving high degree of availability, as these are empowered with the facilities of virtualization that can be used to store data, provided with different platforms and run several applications existing in the network only, i.e. no new physical hardware or software requirements needed at the user end and are vastly available [1]. There is an increase in the number of organizations turning to cloud to transform their business setup. A huge package of combined connected networks, which is vastly spread continuously provides remote access to vastly decentralized IT resources. The remotely accessed resources are in reach with much attained flexibility, scalability and measured with their usage and control. The user act as the main facilitator in terms of resources, cloud provider act as secondary facilitator in terms of profitability and has to manage the backbone of facilities. Cloud providers might also be a third party which in integration with the primary facility provider can balance the load of different resource pooling for widely spread users. It has a multi-tenant environment support and the user’s demands are different as per their interest and need to be catered in isolation from each other. This all involves the overhead of various security vulnerabilities which could occur as a distant gap for the entire cloud environment.