International Journal of Computer Science and Mobile Computing (IJCSMC)
Cloud technology is very constructive and useful in present new technological era, where a person uses the internet and the remote servers to give and maintain data as well as applications. Such applications in turn can be used by the end users via the cloud communications without any installation. Moreover, the end users' data files can be accessed and manipulated from any other computer using the internet services. Despite the flexibility of data and application accessing and usage that cloud computing environments provide, there are many questions still coming up on how to gain a trusted environment that protect data and applications in clouds from hackers and intruders.