The proposed method uses cryptographic techniques to maintain security as security is a critical issue for the cloud, and keeping secure data is a major concern today. Overload due to data duplication is a new challenge for clouds. This article presents the data a download algorithm based on MD5 and AES. Because MD5 more secure than other hashing algorithms, goal Using MD5 algorithm for duplicating data and bringing data to server after uninstalling duplicate copy server. Purpose of use AES security is encrypting data and storing it securely on a server. Update the hash of a newly uploaded file using AES. Results and provides a comparison of several hashing algorithms, showing that MD5 is much safer and takes less time than others. The basic method, which does not use duplicate testing, uses additional storage space and takes longer. The main goal storing useful data in the cloud.
Since its beginnings, cloud computing has been used by billions of users all over the world as an innovation and final solution for utility and distributed computing on Web applications. Its use and impact are felt in a variety of industries, disciplines, and businesses all around the world. Nonetheless, cloud computing has encountered some challenges; the purpose of this research is to identify the factors impacting performance and provide some remedies or advice to cloud users who may encounter performance issues:
The ability to transform data from a variety of sources into intelligence and deliver it to the appropriate individuals and systems.
When several users access the cloud service, load balancing and traffic control are required.
Large-scale data, high-performance computing, automation, response speed, rapid prototyping, and rapid time to production are all issues that must be addressed.
Using the cloud as a platform to help create a more dynamic business intelligence environment
II. LITERATURE SURVEY
Kui Ren  Changing the computer paradigm that is very interesting in today's information technology cloud computing. However, security and privacy are seen as major barriers to widespread adoption. The authors present many safety concerns and encourage further research into security solutions in a public cloud-safe environment.
Sailee Wakhare  Protected password stockpiling is an important concept in a dependent framework confidential word verification, which is still widely used authentication system, despite its somewhat security imperfection. In the meantime, suggest a password authentication framework intended for secure passwords stockpiling and can be successfully integrated into existing verification frameworks. In our program, for the first time, it became clear private key from customer using cryptographic hash function. At that time; a quick password is converted into a bad password. Finally, a bad password has been encrypted with an Invalid Password (ENP) using asymmetric key calculation, and too many encryption encryption may be used to improve security. Cryptographic hash function and symmetric encryption make it difficult to distinguish passwords from ENPs.We will use message notification i.e. The MD5 and AES algorithm for this purpose. Moreover, there are a lot of comparisons of ENPs with a clear secret key provided, say make the previous attack impossible.
Sadi Arman  Cryptography is an emerging topic that has gained momentum from the explosion of data. With the advent of data it has become increasingly important to protect data from external interference. Various algorithms with a pre-defined data acquisition method have been used of which the Advanced Encryption Standard (AES) is one of them. The paper offers a major overhaul of the Advanced Encryption Standard, with the aim of security and ease of use centered on Symmetric Key Cryptosystem and AES algorithm.
Performance is compared using different parameters such as data blocking, block size, encryption / encryption speed, processing time, and integration time. The main reason for this test was to exploit the success of the newly converted AES over real AES using a real-life application. A new key deployment process, a proper switch key method, and a complete Mix-Column process have been introduced. This paper provides statistics based on the AES-128 bit version, but the proposed algorithm may also apply to other versions. The goal was to get faster performance and less memory usage while keeping security difficult to break.
Brent Waters  A new way to get Ciphertext-Policy Attribute is introduced. Encryption (CPABE) is achieved in a standard model under tangible and non-cryptographic assumptions. Any encryptor can display access controls through any access system on top of system attributes using our solutions. The amount of ciphertext, encryption time, and encryption duration all measure according to the complexity of the access formula in our most efficient way.. The only previous attempt made to determine these parameters was evidence of a typical group model. Within our framework, we display three structures. The Parallel Bilinear Diffie-Hellman Exponent (PBDHE) decision-making, which is not considered a common BDHE hypothesis, is used to argue that our first system is selectively protected. Our next two solutions suggest compromising performance to gain potential protection under the (weak) Bilinear-Diffie-Hellman decision system.
III. RESULTS AND DISCUSSION
A. Proposed System
This study includes the technique for duplicate data in a proposed algorithm design, and when users upload a file to the cloud, they should first check which duplicate data comes from which category. Figure 1 shows that on the client side, the first empty file is read by a byte, and the function of MD5 is to create a file hash, and then compare it between files in the duplicate test section. If the hash map file is the same, it receives duplicate data and retrieves data from the server after extracting duplicate copies. If the file hash map does not match, create a private key with AES-256 and save the encrypted data to the server.
Steps For Uploading File To Server
User loads a file to server
Check De-duplication by hash match.
Index of directory maintains hash for hashmap.
In Index1 contains the file name, file hash, secret key.
The directory contains test sets text files.
If hashmap of files matches it detect duplication and does not get uploaded to the server.
If hash map of file does not match, then using AES 256 store encrypted file to server.
The updated file index contains secret key and encrypt using AES 256 and store encrypted file securely to the server.
AESAlgorithm :- AES is a duplicate of the Feistel cipher. Based totally on 'substitution - permutation network'.. Includes a series of connected functions, some of which include replacing input (modified) inputs and others involving slicing pieces (permissions).AES works with data bytes instead of bits. Since the block size is 128 bits, the cipher processes 128 bits (or 16 bits) of input data at a time.
The number of cycles depends on the length of the key as follows:
128 bit key – 10 rounds
192 bit key – 12 rounds
256 bit key – 14 rounds
MD5Algorithm :- The MD5 message-digest hashing algorithm uses 512-bit strings that are separated into 16 words of 32 bits each. Therefore 128 bit hash is generated . Each 512-bit block of data is processed along with the value produced in the previous stage to produce the MD5 digest value. In the first stage, the message-digest values are initialised using sequential hexadecimal numerical integers. Each stage includes four message-digest passes, which change values in the current data block as well as values digested from the previous block. The MD5 digest for that block is calculated using the previous block's final value
Step 1:New file successfully uploaded to the server using the AES encryption algorithm after checking the hash function using MD5 algorithm
In the proposed system, with all data stored on the cloud and the internet, it is critical to maintain data security as a top priority. To encrypt confidential data, we utilised the most secure algorithm we\'ve ever used. To guarantee the highest level of security, we used the AES, and MD5 algorithms in the suggested system. However, there are still numerous holes that can be addressed by improving the effectiveness of these strategies .To make the computer accessible to cloud service users, more effort is needed in this field. This project is about data security and privacy, with a focus on data storage and cloud computing. It aims to improve trust between cloud service providers and consumers by protecting data in cloud computing environments.
 K. Ren, C. Wang, and Q. Wang, “Security challenges for the public cloud,” IEEE Internet Computing, no. 1, pp. 69–73, 2012.
 Sailee Wakhare, Priya Pise, Rutuja Khalate, Shivani Birajdar, Sonali Survase, “Secure Login System using MD5 and AES Attribute Based Encryption Algorithm”, International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075 (Online), Volume-9 Issue-8, June 2020
 Sadi Arman; Tanjila Rehnuma; Mahfuzur Rahman ,” Design and Implementation of a Modified AES Cryptography with Fast Key Generation Technique”, 2020 IEEE International Women in Engineering (WIE) Conference on Electrical and Computer Engineering (WIECON-ECE), Electronic ISBN:978-1-6654-1917-8 ,Print on Demand(PoD) ISBN:978-1-6654-3027-2
 Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization: Brent Waters
 S. Hu, Q. Wang, J. Wang, Z. Qin, and K. Ren, “Securing SIFT: Privacy-preserving outsourcing computation of feature extractions over encrypted image data,” IEEE Transactions on Image Processing, vol. 25, no. 7, pp. 3411–3425, 2016.
 Mohamed Ismail, Badamasi Yusuf ” ENSURING DATA STORAGE SECURITY IN CLOUD COMPUTING WITH ADVANCED ENCRYPTION STANDARD (AES) AND AUTHENTICATION SCHEME (AS)” International Journal of Information System and Engineering Vol. 4 (No.1), ISSN: 2289-7615.
 Khalid, U., Ghafoor, A., Irum, M. &, Shibl, M. A., 2013.” Cloud Based Secure and Privacy Enhanced Authentication and Authorization Protoco. Procedia”, Volume 22, pp. 680-688..
 Kokane, M., Jain, P. & Sarangdhar, P., 2013.”Data Storage Security in Cloud Computing”. International Journal of Advanced Research in Computer and Communication Engineering , 2(3), pp. 1388- 1389.
 Wang, G., Q. Liu, J. W. & Guo, M., 2011. “Hierarchical Attribute Based Encryption and Scalable User Revocation for Sharing Data in Cloud Servers. Computers and Security”, 30(5), pp. 320-331.
 Tidke, P. M. P. a. P. B., 2014. “Improving Data Integrity for Data Storage Security in Cloud Computing”. International Journal of Computer Science and Information Technologies (IJCSIT), 5(5), pp. 6680-6684.