The document discusses data security in cloud environments. It covers cloud computing models including infrastructure as a service, platform as a service and software as a service. It also discusses common attacks on clouds like denial of service and phishing attacks. The document outlines cloud security controls that are deterrent, preventive, detective and corrective. It discusses security models for data integrity, privacy and confidentiality in clouds.