Abstract
Abstract In the last three decades, the concept of computation has changed from centralized (client-server not web-based) to distributed systems and recently users are coming to the Cloud Computing “virtual centralization”. Cloud computing is where data, software applications, computer processing power, can be accessed from cloud on line resources. On the one hand, an individual user can access data and applications from any device connected to the internet. What is more, data maintenance and the service is provided by the vendor which means the customer/client is unaware of where the data is, what processes are running or where the data is stored. So, logically, the customer/client has no ability to control over it. The internet is fundamental as the communication media of the cloud computing. This poses a substantial security concern for cloud computing. Guaranteeing the security of data is difficult as they provide numerous services such as Virtualisation, Utility computing, Software as a service (SaaS), Platform as a service (PaaS), and Infrastructure as a service (IaaS) Each of these services have their own issues of security, the vendor of cloud computing has to provide some guarantee in service level agreements (SLA) to convince the client that security issues have been considered and measures have been taken to ensure an adequate degree of security. The SLA has to illustrate diverse levels of security based on the various services to allow the client to understand the policies of the security which are being implemented. This project identifies issues related to cloud computing that should be considered by security practitioners. Three types of cloud computing issues are examined: integrity, availability, and confidentiality, and inspect the techniques that can be employed to counter them.