Abstract— Cloud computing is so named for the reason that the information being accessed is found in the "clouds", it
does not entail a user to be in a precise place. Organizations found that cloud computing allows them to diminish the cost
of information management, in view of the fact that they are not obligatory to own their own servers. They can use
capacity leased from third parties. It is more important to store and to secure the data in the cloud. It plays a vital role in
the cloud. The data that can be secured by implementing SVAC (Security Virtualization Architecture for Cloud) Firewall
in the virtual environment. An effectual firewall security has been implemented for jamming and filtering the superfluous
requests coming from the clients prior to the request move towards the virtual machine. Next step is to secure the users.
During the demand dispensation, if the abuser requests the sophisticated of information from the cloud, then based on the
compensation prepared by the cloud client, they can access the data from the cloud server. This paper shows the
architecture and the unwanted request can be restricted through SVAC firewall also how the high level of data that can be
accessed by the highly authorized user.