TY - JOUR AU - Meena. R AU - Srinithy. S AU - Kavipriya .P AU - R Charanya PY - 2019/03/31 Y2 - 2024/03/29 TI - The Securing Coding-based Cloud Storage opposed to malignant Attacks JF - GPH - International Journal Of Computer Science and Engineering JA - cse VL - 2 IS - 03 SE - Articles DO - UR - https://gphjournal.org/index.php/cse/article/view/189 AB - Nowadays cloud is becoming an emerging technology where the user can store their data and access it remotely using the internet. But the security to the user data has becomea major concern. pollution attack, a set of malicious entities trying to corrupt our storeddata in the cloud, which is considered as one of the major risk that affect data security in cloud storage . In our proposed technique , we show how to prevent the pollution attack and how to store our file safely.. The following techniques and algorithm are implementedin our projects.. our first technique is ,the user send the data by encrypting it using RC5ALGORITHM. The user can able to upload the following file format only(.jpg, .txt). The another technique is Checksum Method, a user send an encrypted file to the admin by using this method. This generates a key for that particular encrypted file. The encrypted file has to be verified by the admin. By this verification the checksum method generates a key to the file if the file has same key means the file not hacked or not attached. After verification the admin has to upload the file safely in cloud. If the user need that file means,he has to send a request to the admin.Only after getting the response key from admin the user able to download the file. Our Approach is to very robust and the polluters can be easily isolated. ER -