SlideShare a Scribd company logo
DATA INTEGRITYAND SECURITY
Tunuguntla Hemanth
School of Computer Science and Engineering
Lovely Professional University
ABSTRACT:
Cloud Computing is a type of computing
that uses hardware and software to deliver a
service over Internet. It can be used to
access the applications and files from any
device across the globe over the internet. In
this the information and data are stored in
physical and virtual data servers through a
service provider like Amazon etc.
Data Integrity is one among the foremost
concern for the clients because the data
that’s stored within the large data centres
remains for an extended period of time as
long as because the client’s access with
completeness, accuracy and Integrity.
It refers to the maintaining and assurance
and consistency of required data. In general
the overall summary of Data Integrity
technique is almost same.
The data which is recorded which later
retrieval ensure that the data should be same
as it was originally as recorded.
Data Integrity isn’t to be confused with the
Data Security, the discipline of protecting
the information from the unauthorized
parties. If the changes are the results of the
unauthorized access, it might be going to be
a failure in Data Security.
Cloud Security means the protection of
valuable information from the hackers,
theft, leakage and deletion. These incidents
or attacks that affect the services provided
to the clients by the service providers such
as bank accounts and email accounts etc.
INTRODUCTION:
In the cloud storage architecture, cloud
make it possible to access our information
from anywhere at any time. In Cloud
Computing there are four Cloud Storages:
•Public cloud storage: In publicly cloud
storage system, it can access by any
subscriber with a web connectivity and
access to the cloud space.
•Private cloud storage: In privately cloud
storage system, it’s established for a
selected organizations and limits to access
to those organizations.
•Hybrid cloud storage: In hybrid cloud
storage, it’s combination of the publicly
cloud storage system and privately cloud
storage system. It means where critical
cloud data located in privately cloud while
other data is stored and accessed from
public cloud.
•Mobile cloud storage: In mobile cloud
storage, it stores the separate data within the
cloud and access it from anywhere at any
time.
Cloud has become an alternative and
advanced way of data storage for
organizations for a variety of industries.
New organizations are building up their
infrastructure on the cloud and many older
organizations are moving their
infrastructure from traditional to the cloud
platform. When we perform various
operations in the cloud, we must know that
all the operations are being performed on
the data.
CLOUD ARCHITECTURE:
The main goal of the Cloud Computing is
to have high performance computing power
which is used in research facilities
generally. It is to perform millions and
trillions of computations in fraction of
seconds which is mostly required by the
consumer.
The hardware layer: This layer is
responsible for maintaining the physical
resources of the cloud which comprises of
switches, physical server, routers, cooling
system etc.
The infrastructure layer: Also called the
virtualization layer. It creates a pool like
environment for the devices which works as
a storage and are useful for computational
services by dividing the resources into
parts. Because it contains a key role within
the cloud computing and many of its
attributes works as dynamic resource
assignment.
The application layer: With in the
hierarchy of the cloud architecture this
layer is at the highest level. It comprises of
the layers with the particular cloud
applications.
In this paper the focus on Data Integrity and
Security which are exposing to risk within
the cloud storage services and provided the
information redundancy and data
dependability by using Homomorphic
Encryption.
In this Homomorphic Encryption the
security analysis also depicts us the
suggested model is highly efficient against
the malicious attacks, theft and leakage etc.
It is to achieve storage correctness and the
error localization.
Cloud computing saves the time and money
of the organisation or the company. But
trusting it is more important because the
data is the most important thing for the
organisation. Because the data that they
share in the cloud is directly into the
database or through an application
HOMOMORPHIC ENCRYPTION:
It is a new type of Encryption that requires
a secret key to decrypt. This computes on
encrypted data without decryption. No one
sees results without a secret key.
In this a cryptographic algorithm is
explained for a brief idea on the
secure communication and how it
works. For more efficiency and for
very thick layered security there are
many techniques that combines but
this is helps in establishing a secure
connection.
Example:
If you want to keep your DNA data secret,
but you still want to use some services, let’s
say to find your relatives like you can just
upload the encrypted version of your DNA
to the database and they provide matching
services for you and return the results. Even
you have relative or not you get some result
encrypted back. Only you can see the result.
All the data is encrypted, and the service
provider does not know nothing about it.
Real lifetime applications of these is I-Dash
application etc. These focus text on
Genomic data.
Explanation on Homomorphic
Encryption:
There are two zones which requires a safe
zone. Outside of the safe zone all the data
should be encrypted. The encryption
doesn’t have to be done by yourself because
there is public key encryption that use a
public key. Even the results outside the safe
zone are encrypted.
Popular Schemes:
TFHE: It is one of the most efficient
schemes now a days. It focuses on logic
gates and bits. It is like redesigning logic
circuit.
BGV, BFV: They perform exact arithmetic
vectors of numbers.
Five Stages in Homomorphic Encryption:
1. Setup
2. Key Generation
3. Encryption
4. Evaluation
5. Decryption
Set-Up:
In the setup we need to choose the scheme
and some security parameters and
performance parameters functionality.
Key Generation:
After setting up the parameters we can do
the key generation and here the secret key
is the one that we need to protect.
And the other three are generated from the
secret key and they all are considered to be
public. So we can these keys to anyone and
they can never compromise your data.
These are required for computation and the
public key is used for encryption and
decryption as well.
Encryption:
It is a high-level view where we encrypt
vector of numbers. Many of it becomes
Ciphertext which becomes two
polynomials.
Evaluation:
It is the stage where we really write a
program. Like if there is a algorithm in the
HE. We can write it down in HE and
happens in evaluation. It is just a
computation on a secure data.
Decryption:
After the computation is done, we decrypt
the data.
SIMD Computation:
A single instruction multiple datum, when
you issue a single instruction or operation it
applies to all the data independently. It is
called as a single instruction multiple data.
We use that with homomorphic Encryption.
NOTATIONS PRELIMINARIES:
f - The information file to be stored.
A - The dispersal matrix, which indicates a
collection n= m + k vectors.
G - The encoded file matrix.
f key(.) – function
ver - A version number
Let F = (F1, F2, F3, …. Fm) and Fi = (f1i,
f2i…... fli) T ( I ∈ {1, . . . , m}).
Here T denotes that every Fi is represented
as a column vector, and data vector size
denoted l in blocks. Of these blocks are
elements of GF (2p).
The systematic layout with parity vectors is
achieved with the data dispersal matrix A,
derived from a matrix derived from a β2m-
1 … βmm-1 … βm+1m-1 βnm-1 where βj
(j ∈ {1, . . ., n}) are same elements that are
chosen randomly from GF (2p).
After a series of basic row transformations
then the matrix is often written as:
1 0 . . . 0 P11 P12 . . .P1k 0 1 . . .
0 P21 P22 . . . Pmk
A = 0 0 . . . 1 Pm1 Pm2 . . . Pmk
By multiplying F by A, the user obtains the
encoded file is:
G = F.A = (G (1), G(2),..., G(m), G(m+1), .
. ., G(n)) =
(F1, F2, . . ., Fm, G(m+1), . . ., G(n)),
Where G(j) = (g1(j), g2(j), . . ., gl(j)) T (j ∈
{1..., n}).
It is noticed and also the multiplication then
reproduces the information file vectors of F
and also the remaining part (G(m+1), . . .,
G(n)) are k parity vectors generated which
are supported on F.
Algorithm 1 Token Precomputation
1: procedure
2: Select parameters l, n and performance f,
φ;
3: Select the amount t of tokens;
4: Select the amount r of index per
confirmation;
5: produce pass key Kprp and challenge key
kchal;
6: for the vectors G(j), j ← 1, n, do
7: for round i← 1, t d
8: Derive αi = fkchal and kprp from Kprp
9: compute
10 ends for
11: end for
12: store all the vis locally
13: end procedure.
FUTURE WORK:
Cloud Computing is in continual
development, while people are enjoying the
numerous benefits that cloud computing
brings, security in clouds may be a key
challenge.
• Much vulnerability in clouds still exists
and hackers still proceed to exploit these
security holes.
• During this paper I have examined that the
security and safety vulnerabilities in clouds
from three perspectives), included related
real-world exploits, and introduced
countermeasures to those security breaches.
• Within the future, further efforts in
studying cloud security risks and also the
countermeasures to cloud security breaches
must continue.
CONCLUSION:
In this paper, I have examined the issues
and concern with security in cloud
computing. As we rely on erasing and
correcting the code in the file that support
the redundancy of the vectors using the
Homomorphic Encryption. The fact is that
the security and the privacy suggest that the
student’s intention to use the cloud services
positively related to their privacy
perception.
REFERENCES:
1. Book By: K. D. Bowers, A. Jules,
and A. Opera, “High-availability &
Integrity for Cloud Storage”
2. Algorithm from academia-
Research on Cloud Computing.
3. From You Tube
(https://www.youtube.com/watch
?v=SEBdYXxijSo).

More Related Content

PDF
Image encryption
PDF
Data security framework for cloud computing networks
PDF
Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...
PDF
Secure Data Sharing Using Compact Summation key in Hybrid Cloud Storage
PDF
Integrity verification for an optimized cloud architecture
PDF
H43064650
PDF
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
DOC
secure mining of association rules in horizontally distributed databases
Image encryption
Data security framework for cloud computing networks
Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...
Secure Data Sharing Using Compact Summation key in Hybrid Cloud Storage
Integrity verification for an optimized cloud architecture
H43064650
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
secure mining of association rules in horizontally distributed databases

What's hot (19)

PDF
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
PDF
A comprehensive study of fhe schemes ijact journal
DOCX
Image encryption using aes key expansion
PDF
The Architecture of Cloud Storage Model Based On Confusion Theory
PDF
A New Approach of Cryptographic Technique Using Simple ECC & ECF
PDF
Image encryption and decryption using aes algorithm
PDF
RSA Based Secured Image Steganography Using DWT Approach
PDF
M021201092098
PPTX
Image encryption and decryption
PPT
File transfer with multiple security mechanism
PDF
A research paper_on_lossless_data_compre
PDF
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
PDF
Classification of secure encrypted relationaldata in cloud computing
PPTX
Image encryption using aes key expansion
PDF
Back-Propagation Neural Network Learning with Preserved Privacy using Cloud C...
PDF
Color Image Encryption and Decryption Using Multiple Chaotic Maps
PDF
Performance Analysis of Encryption Algorithm for Network Security on Parallel...
PDF
Compressive Sensing Based Simultaneous Data Compression and Convergent Encryp...
PDF
COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
A comprehensive study of fhe schemes ijact journal
Image encryption using aes key expansion
The Architecture of Cloud Storage Model Based On Confusion Theory
A New Approach of Cryptographic Technique Using Simple ECC & ECF
Image encryption and decryption using aes algorithm
RSA Based Secured Image Steganography Using DWT Approach
M021201092098
Image encryption and decryption
File transfer with multiple security mechanism
A research paper_on_lossless_data_compre
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
Classification of secure encrypted relationaldata in cloud computing
Image encryption using aes key expansion
Back-Propagation Neural Network Learning with Preserved Privacy using Cloud C...
Color Image Encryption and Decryption Using Multiple Chaotic Maps
Performance Analysis of Encryption Algorithm for Network Security on Parallel...
Compressive Sensing Based Simultaneous Data Compression and Convergent Encryp...
COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...
Ad

Similar to Cloud computing term paper (20)

PDF
Improving Data Storage Security in Cloud using Hadoop
PDF
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
PDF
A Survey of the Homomorphic Encryption Approach for Data Security in Cloud Co...
PPTX
Basics of CRYPTOGRAPHIC techniques applications.pptx
PPTX
CLOUD COMPUTING AND CRYPTOGRAPHY (1).pptx
PDF
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
PDF
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
PDF
Cloud computing and a new approach in data encryption technique
PDF
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
PDF
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms
PDF
Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...
PDF
IRJET- Secure File Storage on Cloud using Cryptography
PDF
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
PDF
IRJET-Domain Data Security on Cloud
PDF
Big data security_issues_research_paper
PDF
IJARCCE 20
PDF
U04503119122
PDF
Exploring Cloud Encryption
PDF
Cloud Cryptography
PDF
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
Improving Data Storage Security in Cloud using Hadoop
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
A Survey of the Homomorphic Encryption Approach for Data Security in Cloud Co...
Basics of CRYPTOGRAPHIC techniques applications.pptx
CLOUD COMPUTING AND CRYPTOGRAPHY (1).pptx
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
Cloud computing and a new approach in data encryption technique
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms
Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...
IRJET- Secure File Storage on Cloud using Cryptography
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET-Domain Data Security on Cloud
Big data security_issues_research_paper
IJARCCE 20
U04503119122
Exploring Cloud Encryption
Cloud Cryptography
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
Ad

Recently uploaded (20)

PPTX
additive manufacturing of ss316l using mig welding
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPTX
OOP with Java - Java Introduction (Basics)
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PPTX
UNIT 4 Total Quality Management .pptx
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PDF
composite construction of structures.pdf
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPTX
Welding lecture in detail for understanding
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PPTX
web development for engineering and engineering
additive manufacturing of ss316l using mig welding
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
OOP with Java - Java Introduction (Basics)
Foundation to blockchain - A guide to Blockchain Tech
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
UNIT 4 Total Quality Management .pptx
Operating System & Kernel Study Guide-1 - converted.pdf
composite construction of structures.pdf
Embodied AI: Ushering in the Next Era of Intelligent Systems
Welding lecture in detail for understanding
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
Model Code of Practice - Construction Work - 21102022 .pdf
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
web development for engineering and engineering

Cloud computing term paper

  • 1. DATA INTEGRITYAND SECURITY Tunuguntla Hemanth School of Computer Science and Engineering Lovely Professional University ABSTRACT: Cloud Computing is a type of computing that uses hardware and software to deliver a service over Internet. It can be used to access the applications and files from any device across the globe over the internet. In this the information and data are stored in physical and virtual data servers through a service provider like Amazon etc. Data Integrity is one among the foremost concern for the clients because the data that’s stored within the large data centres remains for an extended period of time as long as because the client’s access with completeness, accuracy and Integrity. It refers to the maintaining and assurance and consistency of required data. In general the overall summary of Data Integrity technique is almost same. The data which is recorded which later retrieval ensure that the data should be same as it was originally as recorded. Data Integrity isn’t to be confused with the Data Security, the discipline of protecting the information from the unauthorized parties. If the changes are the results of the unauthorized access, it might be going to be a failure in Data Security. Cloud Security means the protection of valuable information from the hackers, theft, leakage and deletion. These incidents or attacks that affect the services provided to the clients by the service providers such as bank accounts and email accounts etc. INTRODUCTION: In the cloud storage architecture, cloud make it possible to access our information from anywhere at any time. In Cloud Computing there are four Cloud Storages: •Public cloud storage: In publicly cloud storage system, it can access by any subscriber with a web connectivity and access to the cloud space. •Private cloud storage: In privately cloud storage system, it’s established for a selected organizations and limits to access to those organizations. •Hybrid cloud storage: In hybrid cloud storage, it’s combination of the publicly cloud storage system and privately cloud storage system. It means where critical cloud data located in privately cloud while other data is stored and accessed from public cloud. •Mobile cloud storage: In mobile cloud storage, it stores the separate data within the cloud and access it from anywhere at any time. Cloud has become an alternative and advanced way of data storage for organizations for a variety of industries. New organizations are building up their infrastructure on the cloud and many older organizations are moving their infrastructure from traditional to the cloud platform. When we perform various operations in the cloud, we must know that all the operations are being performed on the data.
  • 2. CLOUD ARCHITECTURE: The main goal of the Cloud Computing is to have high performance computing power which is used in research facilities generally. It is to perform millions and trillions of computations in fraction of seconds which is mostly required by the consumer. The hardware layer: This layer is responsible for maintaining the physical resources of the cloud which comprises of switches, physical server, routers, cooling system etc. The infrastructure layer: Also called the virtualization layer. It creates a pool like environment for the devices which works as a storage and are useful for computational services by dividing the resources into parts. Because it contains a key role within the cloud computing and many of its attributes works as dynamic resource assignment. The application layer: With in the hierarchy of the cloud architecture this layer is at the highest level. It comprises of the layers with the particular cloud applications. In this paper the focus on Data Integrity and Security which are exposing to risk within the cloud storage services and provided the information redundancy and data dependability by using Homomorphic Encryption. In this Homomorphic Encryption the security analysis also depicts us the suggested model is highly efficient against the malicious attacks, theft and leakage etc. It is to achieve storage correctness and the error localization. Cloud computing saves the time and money of the organisation or the company. But trusting it is more important because the data is the most important thing for the organisation. Because the data that they share in the cloud is directly into the database or through an application HOMOMORPHIC ENCRYPTION: It is a new type of Encryption that requires a secret key to decrypt. This computes on encrypted data without decryption. No one sees results without a secret key. In this a cryptographic algorithm is explained for a brief idea on the secure communication and how it works. For more efficiency and for very thick layered security there are many techniques that combines but this is helps in establishing a secure connection. Example: If you want to keep your DNA data secret, but you still want to use some services, let’s
  • 3. say to find your relatives like you can just upload the encrypted version of your DNA to the database and they provide matching services for you and return the results. Even you have relative or not you get some result encrypted back. Only you can see the result. All the data is encrypted, and the service provider does not know nothing about it. Real lifetime applications of these is I-Dash application etc. These focus text on Genomic data. Explanation on Homomorphic Encryption: There are two zones which requires a safe zone. Outside of the safe zone all the data should be encrypted. The encryption doesn’t have to be done by yourself because there is public key encryption that use a public key. Even the results outside the safe zone are encrypted. Popular Schemes: TFHE: It is one of the most efficient schemes now a days. It focuses on logic gates and bits. It is like redesigning logic circuit. BGV, BFV: They perform exact arithmetic vectors of numbers. Five Stages in Homomorphic Encryption: 1. Setup 2. Key Generation 3. Encryption 4. Evaluation 5. Decryption Set-Up: In the setup we need to choose the scheme and some security parameters and performance parameters functionality. Key Generation: After setting up the parameters we can do the key generation and here the secret key is the one that we need to protect. And the other three are generated from the secret key and they all are considered to be public. So we can these keys to anyone and they can never compromise your data. These are required for computation and the public key is used for encryption and decryption as well. Encryption: It is a high-level view where we encrypt vector of numbers. Many of it becomes Ciphertext which becomes two polynomials. Evaluation: It is the stage where we really write a program. Like if there is a algorithm in the HE. We can write it down in HE and happens in evaluation. It is just a computation on a secure data. Decryption: After the computation is done, we decrypt the data. SIMD Computation: A single instruction multiple datum, when you issue a single instruction or operation it applies to all the data independently. It is called as a single instruction multiple data. We use that with homomorphic Encryption. NOTATIONS PRELIMINARIES: f - The information file to be stored. A - The dispersal matrix, which indicates a collection n= m + k vectors.
  • 4. G - The encoded file matrix. f key(.) – function ver - A version number Let F = (F1, F2, F3, …. Fm) and Fi = (f1i, f2i…... fli) T ( I ∈ {1, . . . , m}). Here T denotes that every Fi is represented as a column vector, and data vector size denoted l in blocks. Of these blocks are elements of GF (2p). The systematic layout with parity vectors is achieved with the data dispersal matrix A, derived from a matrix derived from a β2m- 1 … βmm-1 … βm+1m-1 βnm-1 where βj (j ∈ {1, . . ., n}) are same elements that are chosen randomly from GF (2p). After a series of basic row transformations then the matrix is often written as: 1 0 . . . 0 P11 P12 . . .P1k 0 1 . . . 0 P21 P22 . . . Pmk A = 0 0 . . . 1 Pm1 Pm2 . . . Pmk By multiplying F by A, the user obtains the encoded file is: G = F.A = (G (1), G(2),..., G(m), G(m+1), . . ., G(n)) = (F1, F2, . . ., Fm, G(m+1), . . ., G(n)), Where G(j) = (g1(j), g2(j), . . ., gl(j)) T (j ∈ {1..., n}). It is noticed and also the multiplication then reproduces the information file vectors of F and also the remaining part (G(m+1), . . ., G(n)) are k parity vectors generated which are supported on F. Algorithm 1 Token Precomputation 1: procedure 2: Select parameters l, n and performance f, φ; 3: Select the amount t of tokens; 4: Select the amount r of index per confirmation; 5: produce pass key Kprp and challenge key kchal; 6: for the vectors G(j), j ← 1, n, do 7: for round i← 1, t d 8: Derive αi = fkchal and kprp from Kprp 9: compute 10 ends for 11: end for 12: store all the vis locally 13: end procedure. FUTURE WORK: Cloud Computing is in continual development, while people are enjoying the numerous benefits that cloud computing brings, security in clouds may be a key challenge. • Much vulnerability in clouds still exists and hackers still proceed to exploit these security holes. • During this paper I have examined that the security and safety vulnerabilities in clouds from three perspectives), included related real-world exploits, and introduced countermeasures to those security breaches. • Within the future, further efforts in studying cloud security risks and also the countermeasures to cloud security breaches must continue. CONCLUSION: In this paper, I have examined the issues and concern with security in cloud computing. As we rely on erasing and correcting the code in the file that support the redundancy of the vectors using the Homomorphic Encryption. The fact is that the security and the privacy suggest that the student’s intention to use the cloud services positively related to their privacy perception. REFERENCES:
  • 5. 1. Book By: K. D. Bowers, A. Jules, and A. Opera, “High-availability & Integrity for Cloud Storage” 2. Algorithm from academia- Research on Cloud Computing. 3. From You Tube (https://www.youtube.com/watch ?v=SEBdYXxijSo).