This paper represents the security methods, which secure the data of users not only at the cloud but also on transmission as the man in middle attack is completely avoided by DiffieHellman key exchange algorithm. This paper also addresses the problems of the access control using proper authentication mechanism by two factors. D-H protocol fits better in this scenario as number of users on cloud is very large and key management is very difficult. Our proposed scheme eliminates the overheads of key computation and their management. Implementation of the cryptographic algorithms in a cloud computing environment using Java RMI is also covered in this paper. Provision of security to the users data on the cloud will defiantly empowers the Data owner to outsource the data to cloud.