TY - JOUR TI - A Novel Approach for Data Sharing Securely in Cloud Computing AU - Ch. Radhika Devi AU - K. Jaya Krishna JO - International Journal of Scientific Research in Computer Science, Engineering and Information Technology PB - Technoscience Academy DA - 2018/04/30 PY - 2018 DO - https://doi.org/10.32628/IJSRCSEIT UR - https://ijsrcseit.com/CSEIT1833551 VL - 3 IS - 4 SP - 1155 EP - 1162 AB - Cloud storage is aservice of clouds that causes, associations to change from building up in-house information stockpiling frameworks to the cloud. The advances that proposed as of late have offered ascend to the ubiquity and accomplishment of cloud computing. Be that as it may, while outsourcing the information and business application to athird party causes the security and protection issues to wind up noticeably a basic concern. Inside an association, information should be shared among various clients with various certifications. Secure sharing of information among a gathering which causes an insider danger from substantial or noxious client is an essential research issue. Current approach gives an answer on previously mentioned issue. Under this approach, the third party is a responsible for security related tasks like encryption, decryption, and key age, get to control, and so on. In any case, there might be a probability that this third party may indicate noxious conduct and causes insider risk. A superior approach ought to give an answer which limits confide in third party while guaranteeing information classification. We propose an approach, in light of two layers of encryption that tends to such necessity. Under our approach, the information owner plays out a lower layer encryption, though the third party plays out an upper layer encryption over the owner scrambled information. A testing issue is the means by which to keep up secrecy of information. To actualize it we moved access control right dissemination task to the owner. The owner sends a key to legitimate clients for encryption and decryption. This guarantees just substantial client will get an entrance to the information.