Abstract: - Cloud computing is one of the most used technologies these days due to the numerous benefits that it offers. It is very easy for small-scale enterprises and individuals to store their data on the cloud and operate from the cloud rather than investing in infrastructure, software, and hardware. the cloud offers flexible, cost-effective services and applications for any type of user. The cloud environment is scalable from the storage requirements of an individual to a large-scale enterprise. Hence it can be used by anyone and everyone is charged as per the usage of the cloud resources. One can maintain their organizational data in the databases over the cloud. Some schemes to secure the database content on the cloud are in place but they do not offer complete privacy protection and data confidentiality and there is still some scope for data leakage from the cloud and it was a serious security threat. The main reason for the privacy issues of the cloud is that the data is not in the control of the data owner and he must completely rely on the services provided by the cloud administrator. The existing schemes do not provide sufficient privacy preservation and can pose security threats when the SQL queries run on the cloud databases. There is a scope for pattern identification of access with the increasing number of queries that hit the cloud database. In this project, we come up with a novel mechanism to secure the data on the database using a Two-cloud approach with a set of connection procedures to provide confidentiality and prevent the data leakage of numeric queries that hit the cloud database. security analysis and simulation of the above-mentioned technique has yielded better results when compared to its existing counterparts.Keywords: - privacy preserving, range query, database, cloud computing