International Journal of Applied Engineering Research ISSN 0973-4562 Volume 9, Number 20 (2014) pp. 7755-7768 © Research India Publications http://www.ripublication.com Data and Information Storage Security from Advanced Persistent Attack in Cloud Computing J.Vijaya Chandra 1* Dr. Narasimham Challa 2 and Dr. Mohammed Ali Hussain 3 1* Research Scholar, Department of Computer Science and Engineering, KL University, Guntur Dist., A.P., India. E-mail: vij a y a c handra. phd@gmail.com 2 Professor & HOD, Department of Computer Science and Engineering, S.R College of Engineering, Ananthasagar, Hasanparthy, Warangal, Telangana, India. E-mail:narasimham_c@yahoo.com 3 Professor, Department of Electronics and Computer Engineering, KL University, Guntur Dist., A.P., India. E-mail:alihussain.phd@gmail.com Abstract Cloud Security relates to Data and Information Storage Security which includes Network Security. An attack is an action performed to exploit vulnerability. Cloud Computing deals with protocols, policies, services, technologies, architecture and infrastructure. This paper clarifies the nature of Advanced Persistent Attack and Security Measures and Controls were discussed, an outline of different security procedures and techniques explained. This paper involves the Security Reference Architecture and secured model of cloud computing with technical security measures. This paper immense the need of securing the cloud as shares resources. Keywords: Advanced Persistent Attack, Cloud Security, vulnerability. Introduction Security is a major Issue, It is required to address operational and control point of view under a Particular Domain, where we can focus on traditional as well as application security. Data center operations are monitored and maintained where different techniques are used for recover data at disasters, vulnerabilities in cloud services should be identified and a great attention should be given for the protection of Cloud. The data security is the foundation of information security, the security of data storage is managed with the existing techniques such as cryptography, Authentication and isolation of virtual environments and so on where more