TY - JOUR TI - Privacy Preserving In Cloud Using Dual Protection AU - C. Bhagya Lakshmi AU - K. Gomathi AU - P. Manisha AU - Mrs.L.Sharmila JO - International Journal of Scientific Research in Computer Science, Engineering and Information Technology PB - Technoscience Academy DA - 2018/04/30 PY - 2018 DO - https://doi.org/10.32628/IJSRCSEIT UR - https://ijsrcseit.com/CSEIT1833219 VL - 3 IS - 3 SP - 631 EP - 635 AB - Security in cloud is one of the important factor in cloud, here we can preserve our data into cloud storage. More number of clients will like to store their data to PCS (public cloud servers) along with the rapid development of cloud computing. To save local data storage costs the data is outsourced to cloud servers by cloud storage services. Multiple verification tasks can be performed efficiently by by the auditor from different users and the cloud-stored data can be updated dynamically. It allows the clients to check whether their data which has been outsourced is kept intact without downloading the whole data. In our system own auditing is used based on the token generation. Using this key generation technique compare the key values from original keys we can find out the changes about the file. We are using novel public verification scheme for the cloud storage using in distinguish ability obfuscation, which requires a lightweight computation on the auditor and delegate most computation to the cloud. Apart from storing ,the content will be encrypted in the cloud server. If someone tries to hack at the cloud end,it is impossible to break the two different blocks. The security mechanism of our scheme is under the strongest security model. They needto decrypt the files first and then combine the splitted files from three different locations. This is not possible by anyone. With the file owner permission anyone can download the files from the server. At the time of download,key will be generated (code based key generation) and it will be sent to the file owner. We can download the file need to use the key for verification and some other users want to download file owner permission is necessary.