International Journal of Computer Science and Mobile Computing (IJCSMC)
In the cloud computing environment, storing sensitive data is more difficult task. The privacy preserve cost is high when the authors encrypt entire sensitive data. Also encrypt data are not performing well in cloud application. This is becomes the challenging to preserve the sensitive data in cloud. So they analyze the data which is need to be encrypted and other is not. And also split the data in different parts and stored it in different cloud environment. Each part of data sets are contains the tokens. The storage server identifies the data using token keys. The proxy encryption technique is used to encrypt the proxy.