This document discusses cloud computing security and proposes a four level security model for establishing secure connections between cloud consumers and providers.
1) The first level checks the registered MAC address of the client PC to verify identity.
2) The second level identifies the unique IMEI number of the user's mobile device and sends an access code via text message.
3) The third level requires the user to enter their access code, user ID, and password on the cloud web portal.
4) The fourth and final level validates the unique access code provided earlier, completing the security checking process and allowing connection to the cloud server and database.