RTPL (2015) 1-6 © STM Journals 2015. All Rights Reserved Page 1 Recent Trends in Programming Languages Volume 2, Issue 1 www.stmjournals.com Comparative Study on Various Security Algorithms in Cloud Computing K. Santhisri*, P.R.S.M. Lakshmi Department of MCA, Vignan’s University, Guntur, A.P., India Abstract Cloud computing is a model for enabling, convenient, network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction. It is often provided "as a service" over the Internet, remote access server typically in the form of infrastructure as a service (IaaS), platform as a service (PaaS), or software as a service (SaaS). This paper deals with a brief study about various security algorithms, security issues and security attacks in cloud computing. Keywords: Cloud computing, service, security attacks, security algorithms *Author for Correspondence E-mail: srisanthi@gmail.com INTRODUCTION Cloud computing is a colloquial expression that keeps up its application by using central remote servers [1]. Cloud computing relies on sharing of resources to achieve coherence and economies of scale similar to a utility (like the electricity grid). At the initial stage of cloud computing it is the broader concept of converged infrastructure and shares services. The term moving cloud also refers to an organization moving away from a traditional capex model (buy the dedicated hardware and depreciate it over a period of time) to the opex model (use a shared cloud infrastructure and pay as you use it). And it is a new computing paradigm with implications for greater flexibility and availability and also available in lower cost. Because of this, cloud computing has been receiving a good deal of attention lately. There are four deployment models (Figure 1) operated by cloud computing. They are: (i) Community Cloud, (ii) Private Cloud, (iii) Public Cloud, and (iv) Hybrid Cloud. Fig. 1: Deployment Models. Private Cloud The cloud infrastructure is operated solely for an enterprise. It may be managed by the enterprise or a third party and may exist on premise or off premise. Community Cloud The cloud infrastructure is shared by several organizations and supports a specific community that has shared concerns (e.g., mission, security requirements and compliance considerations). Organizations can manage the community cloud or a third party and may exist on premise or off premise. Public Cloud The cloud infrastructure is made available to the general public or a large industry group and it is owned by an organization selling and