# Introduction loud Computing is an upcoming model which provides on-demand access to the resources provided on the network for different users accessing the service from the cloud in an efficient manner [1].The main advantages of cloud computing are providing increased scalability, providing cost effective services to users, customization of applications in an efficient manner, providing better storage space for users etc [2,12]. The different service models provided by the cloud are Software as a Service (Saas), Platform as a service (Paas), Infrastructure as a service (Iaas). In Saas model CSP(cloud service provider) provides the capability of controlling the applications running on the cloud. The benefits of this model are providing better administration, compatibility, collaboration among different users. In Paas model, CSP provides an infrastructure for deploying the applications which have been developed using programming languages that are specified. The benefits of this model are costs can be reduced and up gradation of different services can be done in an optimized manner. In Iaas model, CSP provides the necessary resources for deploying the consumers systems and applications. The benefits of this model are different administrative tasks can be automated in an optimized manner and better services based on policies [1, 3,13]. There are several deployment models which are emerged as cloud came into existence. A The features of an ABE are listed below ? providing confidentiality for user's data. ? providing fine-grained access control for the user's data. # b) Homomorphic Encryption It is promising research area and also cryptographic technique where complex mathematical computations are performed on encrypted data without decrypting them using user's private key. The different steps in performing Homomorphic encryption is summarized below where + and * denotes two algebraic operations. ? Let rÑ?"M be prime number chosen from M which is large and also taken as a secret key. ? Let p and q be two arbitrary integers with (p,q)B then f is group homomorphism in A and B if x,yÑ?" A such that f(x+y)=f(x)*f(y)[15]. ii. Applications ? Analyzing Biometric information? Medical Analysis ? Marketing Analysis ? Survey Analysis iii. Process of Homomorphic Encryption](image-4.png "") ![Data and system classification specifies what data needs to be secured and how valuable data and information systems are. ? Select security control selection of system along with data protection. ? Define the limitations in system taking into account trust, policy, system task and data protection dimensions ? Specify cloud security solutions (system, behavioral and hybrid) shown in fig below and make decision on cloud architecture [18]. Survey on Encryption and Improved Virtualization Security Techniques for Cloud Infrastructure](image-5.png "A") 2![Figure 2 : Cloud Computing Confidentiality Framework i. Advantages ? It provides authentication, confidentiality, integrity and data protection. ? It explains effective security controls for protecting data in private cloud environment III.](image-6.png "Figure 2 :") 4![Figure 4 : VSEM And VREM a) VM Security Monitor (VSEM)It identifies attacks and malicious behavior of the virtual machine by helping HSEM. It is generally operated at two levels[19] ? In Level1, VSEM's monitor their own VM's. The proposed system identifies the VM as attacker if hypervisor recognizes the number of service requests more than specified threshold then VSEM notifies HSEM and switches to Level2[ 19] ? In Level 2, it monitors and captures the activity of each VM where hypervisor sets activity limits for types of activities until HSEM notifies that VM is not an attacker. HSEM gets the reliability status from VREM[19].b) VM Reliability Monitor(VREM)Reliability requirements such as workload have been monitored and load balancer is being notified (within the hypervisor) that sends the workload status to HREM and decides to give VM more resources or not. The proposed HREM detects the overflow attacks if any when VM requests more resources than specified value[19].i. Advantages ? The proposed architecture safeguards each virtual machine against all the possible attacks.](image-7.png "Figure 4 :") © 2014 Global Journals Inc. (US) * computing security requirements and solutions: systematic literature review by Patrick Honer University of Twente * Revisiting cloud security issues and challenges by vaishali singh and s.k.pandey on July2013 * Cloud computing security issues and challenges by kuyoro s.o.ibikunle f,awodele o * Improving security and efficiency for multi-authority access control system in cloud storage by Qi Li JianfengMa Rui Li Ximeng Liu Jinbo Xiong November 18, 2013 * Secure role based data access control in cloud computing by v.satya preiya, r.pavitra and dr june 2011 * Towards securing apis in cloud computing by kumar gunjan, r.k.tiwari and g.sahoo * Enhancing security for secure cloud computing environment by divya chaudary on august 2013 * Secure virtualization for cloud environment using hypervisor based technology by farzad sabahi, member IEEE on February 2012 * Improving Virtualization security by splitting Hypervisor into smaller components by wuqiong pan, yulong zhang meng yu and jiwu jing