International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 11 47 51 _______________________________________________________________________________________________ 47 IJRITCC | November 2017, Available @ http://www.ijritcc.org _______________________________________________________________________________________ Methods of Data Access in Cloud Computing and It‟s Challenges in Network Security Varsha Sharma, Bhawna Suri, Dinesh Kumar Assistant Professor Associate ProfessorAssistant Professor,BPIT. BPIT(under GGSIPU),Delhi BPIT(under GGSIPU), DelhiBPIT(under GGSIPU), Delhi varsha311082@gmail.com, suri_bhawna@yahoo.com, bhardwaj.d2009@gmail.com Abstract: Cloud computing owes to its potency, value effectiveness, flexibility and quantifiability for being a trend setting technology. In this paper, a cloud computing and education based theory has been studied and analyzed. This paper is based on the utilizations of cloud computing services in network security and its applications. Keywords: Cloud Computing, Models, Security issues, Architecture. __________________________________________________*****_________________________________________________ I. Introduction Cloud computing could be a terribly broad term, however the study by Mell and Grance, it may be characterized by the subsequent 5 basic options that are common for all cloud services: self-service queries, network access, resource pooling and its utilization , speedy snap and measured service. The cloud computing is useful within the infrastructure of the business. The cloud computing involves varied technologies, comprised of hardware and software system with the construct of distributed computing, virtualization, net systems management, communication networks, huge information services, and information analytic. The planned theme maintains a brief list to minimize several issues. Nowadays, cloud computing has become the middle of heed within the IT world.[1] It produces dominant computing services to people and organizations via the net, and allows them to access a pool of shared resources like storage servers and applications. Businesses of all sizes area unit adopting cloud computing at associate increasing rate because it provides them with nice advantages like price potency, since they are doing not even have to shop for the hardware and computer code resources, however merely pay per use. [2] Cloud service suppliers supply network services, infrastructure and applications within the cloud to each corporations and people .The most objective of cloud computing is to enhance the employment of distributed resources and be part of them to attain higher outturn, and be able to solve large-scale computation issues. Cloud computing deals with quantifiability, ability, virtualization, delivery models and quality of service. a) Cloud Computing Architecture: In this architecture, there are two sections namely , Front End and Back End. The cloud computing architecture is split into two main sections: Front End and Back End. The Internet connects these two sections. The network can be used by end users, applications or any client and they constitute the front end. Services like multiple computers, servers and data storage together compiles the back end. Fig1: Cloud Computing Architecture [3] The cloud includes a central server that monitors the traffic and manages the system and client demands. The demand of resources isn't continually consistent from client to cloud. So, server virtualization techniques are pertaineded in which all physical servers are: IaaS- Infrastructure as-a-Service: Infrastructure as A Service (IAAS) directs to IT facilities, as well as computers, storage, networks and different pertinent software and hardware facilities. Main purpose of IAAS mean that tenants input their subscriber range. Service suppliers of IAAS give the preceding IT infrastructure services needed by tenants through computing distribution. During the course of this paper, the classical 4-layer logical designstyle of IAAS is applied, as well as physical resource layer, virtual layer, scheduling layer and service layer This provides the infrastructure as a service to its clients. The