International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Volume 5, Issue 2, 2018, PP 17-21 ISSN 2349-4840 (Print) & ISSN 2349-4859 (Online) DOI: http://dx.doi.org/10.20431/2349-4859.0502003 www.arcjournals.org International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Page 17 Security of Data in Cloud Using Trusted Computing Vishal Choudhary 1 , Dr. Vijay Tiwari 2* 1,2 Computer Science and Engineering Centre For Advanced Studies, AKTU Luck now, India 1. INTRODUCTION Cloud Computing came from Grid Computing. Cloud Computing is the service, very much on- demand technology, from application to storage and processing on the internet. Generally companies rent access from cloud service providers to store their data instead of owning their own computing cloud. By renting from cloud service providers, IT infrastructure avoids the cost and complexity of owning and maintaining their data, they simply pay to Cloud Service Providers when they use it. Since in Cloud Computing all the data travelling between your network and whatever service you are accessing in the cloud is going through internet. That’s why security of the data is our major concern. Because that data should be sensitive information about the company or organization. And after storing the data on cloud, accessing of data should be after proper authentication of user. To do so, in this paper we propose Double encryption of text files while storing and accessing of data. A set of software and hardware in the trusted computing is called Trusted Computing Group. And also to ensure Security, Confidentiality, Reliability, Availability, Safety and Integrity. We introduce Trusted Computing Platform (TCP) based on Trusted Platform Module (TPM) into cloud computing system. Authentication, Confidentiality and Integrity will be taken care by Trusted Computing Platform in cloud computing environment. We also introduce Trusted Platform software Stack (TSS), on which cloud computing application use the security function of Trusted Platform Module. There are two services provided by TCP i.e. Authenticated boot, this service finds out which OS is running on computer and acknowledge application about it and also keeps a log of boot process. Encryption, this service lets data to be encrypted and decrypted in the same configuration of machine; if machine’s configuration is different it won’t let data to be decrypted. In Section II, we will discuss some challenges to Cloud Computing. And in section III, we will discuss what the proposed system is and its architecture. Section IV will see how the proposed system works and helps in authenticating users. Section V also helping in minimizing one of the issue in cloud computing by developing trustful relationship for mutual action. In Section VI, will see the interfaces used between the proposed hardware and application. In this Section VII, we will see how cryptographic algorithms secure the text files stored in cloud when used sequentially. 2. SOME MAJOR ISSUES FACED BY CLOUD COMPUTING SECURITY ARE AS FOLLOWS Well, Security is the top prior issue in everyday computing, because Data stored on cloud computing could be sensitive data of the company or organization. Abstract: Cloud computing is a collection of computing systems and servers in which software and other assets are shared publically from the internet. This is another approach to utilize the process, store and offer Data from a system found in any place on planet. Be that as it may, this makes Data unsafe and vulnerable. In this paper, we talk about some security issues in scattered computing and examine a few strategies to enhance security. To do so, we incorporate trusted figuring and distributed computing to enhance security. What's more, to secure content records by executing two fold cryptography calculations. Keywords: cloud; computing security; TCP; TSS. *Corresponding Author: Dr. Vijay Tiwari, Department of computer science & Engineering, Centre for Advance Studies, AKTU Luck now, India