Data Privacy in the Cloud
 Application-level security in the Cloud
 Host-level security in the cloud
NETWORK LEVEL SECURITY IN CLOUD
INFRASTRUCTURE SECURITY IN CLOUD COMPUTING
 Creating virtual machines (VMs) in cloud computing to access different programs across various platforms
 Case Study on Infrastructure as a Service (IaaS) Using Eucalyptus