This document discusses security and privacy issues with cloud computing. It begins by introducing cloud computing and its benefits, then outlines some key security concerns like access control, authentication, availability, and policy integration. It also discusses privacy issues such as unauthorized secondary usage of data and lack of user control. The document proposes four methods to address these issues, focusing on a role-based access control method and policy integration method. It concludes by stating the methods consider cloud computing characteristics and can be further developed to solve other problems.