ACCENTS Transactions on Information Security, Vol 3(12) ISSN (Online): 2455-7196 http://dx.doi.org/10.19101/TIS.2018.311002 36 Cloud computing security: a review Mahale Rahul Bhaskar 1* , Kailash Patidar 2 , Rishi Kushwah 3 and Sudeesh Chouhan 3 M.Tech Scholar, Department of Computer Science, School of Engineering, Sri Satya Sai University of Technology & Medical Sciences, Sehore, Madhya Pradesh, India 1 Professor and HOD, Department of Computer Science, School of Engineering, Sri Satya Sai University of Technology & Medical Sciences, Sehore, Madhya Pradesh, India 2 Assistant Professor, Department of Computer Science, School of Engineering, Sri Satya Sai University of Technology & Medical Sciences, Sehore, Madhya Pradesh, India 3 ©2018 ACCENTS 1.Introduction In the current business arena cloud computing is very helpful and cost effective for small business as well as for the larger business [1−5]. In the today’s world the use of cloud computing is spreading in different areas. It includes the university, business enterprise, IT industry, Health sector etc. The security concern is the major concern these days. There are several literature which discussed this type of issues like [6−10]. Virtualization, dominating enlisting is additionally the more obvious office parts of passed on preparing. In any case, to satisfy the execution on the parallel framework and keeping up the decency is convincing [11]. In every single one of these works, stunning attempts are made to plan strategies that meet assorted fundamentals: high game plan feasibility, stateless check, unbounded use of request and wretchedness of information, and so forth. Thinking about the piece of the verifier in the model, every last one of the plans showed before fall into two classes: private auditability and open auditability [5]. Despite the manner in which that orchestrates with private auditability can play out the plans enough, yet it is attempting circumstance if the information is anchoring quietly [5]. *Author for correspondence Virtualization is the key fragments of scattered figuring by which information sharing is conceivable between various machines of virtual closeness from the server develop [12]. Virtualization draws in the live relocation [9] of virtual machines which helps in keeping up the guaranteed SLA to the cloud client other than to change stack crosswise over physical servers in the information centres [12, 13]. In the cloud provider market the main providers are Google, Microsoft, Amazon and Salesforce.com. The appropriated figuring advantage show relies upon the data correspondence layer. The whole correspondence is relies upon three layers. The layers of the cloud computing are: Software as a Service (SaaS) which is for the software based application. Customer relationship organization (CRM) is the example [14]. Platform as a Service (PaaS) is fior the platform based application for he different deployment services. Infrastructure as a Service (IaaS) by and large joins virtualization conditions as got associations rather than physical or submitted PC gear. In the standard method for figuring the advantages are picked up locally which are incidentally higher in expense and not sensible. This compels the courses in which a client could take an interest with the thing in Review Article Abstract In the current scenario the emerging world demands of clod computing services is increasing day by day. This increasing demand is due to the on demand service with cost effective approach. The increasing trend as several advantages offered through cloud computing. But the negative side is the security issues. Due to the huge use and data communication through data transfer on demand there is several possibility of security breach. So in this paper the main aim is to discus and provides the analysis based on the previous method in the direction of data security in the cloud computing environment. This analysis provides the security analysis in terms of public and private clouds. Keywords Cloud computing, Security breaches, Public cloud, Private cloud.