International Journal & Magazine of Engineering, Technology, Management And Research (IJMETMR)
Cloud computing involves application systems which are executed within the cloud and operated through internet enabled devices. Purely cloud computing does not rely on the use of cloud storage as it will be removed upon users download action. Clouds can be classified as public, private and hybrid. For transactions to be secure, the authors need to address various constraints from an end-user and cloud service provider's point of view. The end-user is primarily concerned with the provider's security policy, how and where their data is stored and who has access to that data. On the other hand, concerns for the cloud service provider can range from the physical security of the infrastructure and the access control mechanism of cloud assets, to the execution and maintenance of security policy.