title,doi,url,abstract,journal,publication_year,pmid,arxiv Towards Achieving Knowledge Security with the Cloud Computing Implementation Framework, https://doi.org/10.32628/IJSRCSEIT, https://ijsrcseit.com/CSEIT172470, Offering continuous information security for petabytes of information is essential for Cloud Computing. A current study on cloud security expresses that the security of clients' information has the most astounding need and in addition to accomplish with an approach that is efficient adoptable and very much organized. In this way this paper has built up a structure known as Cloud Computing Adoption Framework (CCAF) which has been modified for securing cloud information. This paper clarifies the diagram basis and segments in the CCAF to ensure information security. CCAF is outlined by the framework configuration in light of the necessities and the execution showed by the CCAF multi-layered security. Since our Data Center has 10 petabytes of information there is a gigantic undertaking to give ongoing insurance and isolate. We utilize Business Process Modeling Notation (BPMN) to reenact how information is being used. The utilization of BPMN recreation enables us to assess the picked security exhibitions before genuine usage. Results demonstrate that an opportunity to take control of security break can take near 50 and 125 hours. This implies extra security is required to guarantee all information is very much ensured in the significant 125 hours. This paper has additionally exhibited that CCAF multi-layered security can ensure information progressively and it has three layers of security: 1) firewall and get to control 2) personality administration and interruption avoidance and 3) merged encryption. To approve CCAF this paper has embraced two arrangements of moral hacking tests required with infiltration testing with 10000 Trojans and infections. The CCAF multi-layered security can square 9919 infections and Trojans which can be decimated in seconds and the staying ones can be isolated or separated. The analyses appear despite the fact that the rate of blocking can diminish for nonstop infusion of infections and Trojans 97.43% of them can be isolated. Our CCAF multi-layered security has a normal of 20% preferable execution over the single-layered approach which could just square 7438 infections and Trojans. CCAF can , International Journal of Scientific Research in Computer Science Engineering and Information Technology, 2017, CSEIT172470