Asian Journal of Current Engineering and Maths maths, engineering, computer science, information technology en-US Asian Journal of Current Engineering and Maths 2277-4920 <p><strong><span style="text-decoration: underline;">COPYRIGHT AGREEMENT AND AUTHORSHIP RESPONSIBILITY</span></strong></p><p><strong> <br /></strong></p><p>All paper submissions must carry the following duly signed by all the authors:</p><p>“I certify that I have participated sufficiently in the conception and design of this work and the analysis of the data (wherever applicable), as well as the writing of the manuscript, to take public responsibility for it. I believe the manuscript represents valid work. I have reviewed the final version of the manuscript and approve it for publication. Neither has the manuscript nor one with substantially similar content under my authorship been published nor is being considered for publication elsewhere, except as described in an attachment. Furthermore I attest that I shall produce the data upon which the manuscript is based for examination by the editors or their assignees, if requested.”</p> System for Security in Cloud Computing Environment <p class="IJARCSAbstract">Cloud computing enables the users to access the outsourced data from the cloud server without the hardware and software management. Data stored on a cloud service-provider’s equipment must be encrypted for data security. Encrypting data prior to storage is a common method of data protection, and service providers will be able to build firewalls to ensure that the decryption keys associated with encrypted user data are not disclosed to third party. However, if the decryption key and the encrypted data are held by the same service provider, it raises vulnerability in data security, thus presenting a risk for the unauthorized disclosure of the user data. This paper provides an unique approach/model of cryptography where crypto keys are distributed across the user and service provider with adoption of such a model mainly the CSP insider attack an form of misuse of valuable user data can be treated secured. Thus, the proposed method not only encrypts the sensitive data, but also detects the dishonest party to access the data using combined hash functions.</p> Thota Vishnu Priya Dr. M.N Faruk ##submission.copyrightStatement## 2017-08-04 2017-08-04 39 44 10.15520/ajcem.2017.vol6.iss4.80.pp39-44.