: Cloud computing is rising as a promising IT answer for empowering universal, advantageous, and on request gets to a mutual pool of
configurable processing assets. Nonetheless, the far-reaching appropriation of the cloud is as yet being prevented by the absence of Straight
forwardness and responsibility, which has generally been guaranteed through security evaluating strategies. Cloud computing gives huge
information stock piling and figuring capacities to its clients. A lot of individuals can store different information onto the cloud decisively or
restrictions. Extra security requires a protected distributed storage framework with an autonomous effective reviewing administration to check
the accuracy of re-appropriated information. In such manner, information reviewing alongside protection saving, honesty, and dynamic
capacities plays a capable strategy for keeping from different cloud assaults which are considered in this work.
Key Words: access control, block chain, ftp server, cloud computing, data security, data storage.