This document discusses attaining data security in cloud computing. It aims to address security issues like insider attacks and identity theft. The challenges of storing data across distributed cloud systems while maintaining integrity and control are examined. Traditional cryptographic techniques like encryption, decryption, and digital signatures are explored as well as symmetric and asymmetric ciphers. A system model involving users, cloud service providers, and third party auditors is proposed. Simulation tools and references are also provided.