Cloud computing is deemed to be domain that gives data and assets which are conveyed in means of a support for end-clients more than the global computer network on interest. Distributed storage administration stays away from the price costly on programming, staff support and gives improved execution, a smaller amount of capacity expense and versatility. Yet, sustaining capacity of away information in a protected way is not a simple undertaking in cloud setting and particularly with the intention of putting away information is deemed not to be totally reliable. Cloud conveys administrations through web that expands their presentation to capacity safekeeping susceptibility. Safety is an aspect out of many which contributes to the real disadvantages that maintains a few expansive associations to go into distributed calculating setting. The gist of the paper speaks about two calculations and they are known as CANFIS (Co-Active Neural Fuzzy Interference System) and SCEA (Secure Crypto Encryption). SCEA recommend for an ensured information admittance utilizing effective key administration procedure. CANFIS suggest for data discovery so as to contact transfer document simple to build impeccably. To be precise, the utilization of Co-Active Neural Fuzzy Interference System implies on handling the record in a most brief way to get to specific or required documents. Through this study, researchers try to execute three critical procedures and they are 1.Uploading mass information safely, 2.Entry or Alter immense document, 3.Transfer of substantial record with towering safety. An enormous document is transferred in the distributed space to store as well as it has been scrambled by SCEA calculation for safety reason by the record proprietor. The key pertaining to encryption would be delivered to proprietor mail id. On the off chance that the client gives any information inquiry, the connected documents are shown in view of Co-Active Neural Fuzzy Interference System mining calculation. At the point when the document is gotten to by the client the connection has been delivered to the enrolled mail id of the client and the secret word to get to the record has been delivered to the enlisted contact details of the client via cloud. At that point the client subtle elements have been transferred to the proprietor and the proprietor confirm the client points of interest as well as the key pertaining to the encryption would be sent so as to unscramble the record. At long last the clients get to the document with a colossal safety in excess of private cloud.