Zawawi, NourHamdy El-Eliemy, MohamedEl-Gohary, RaniaTolba, Mohamed F2019-10-262019-10-262014https://doi.org/10.1007/978-3-662-43616-5_19https://cutt.ly/YyTKsXzMSA Google ScholarIn Cloud environments, resources are provided as services to endusers over the internet upon request. Resources’ coordination in the Cloud enables users to reach their resources anywhere and anytime. Ensuring the security in Cloud environment plays an important role, as customers often store important information on Cloud storage services. These services are not always trusted by the data owners. Customers are wondering about the integrity and the availability of their data in the Cloud. Users need to save their data from outsider and insider attackers (i.e. attacker within service providers’ coordination’s). Moreover, any collateral damage or errors of Cloud services provider arises as a concern as well. Most of the vital security needs and issues regarding data Cloud services are mentioned in this chapter. The purpose of this chapter is to examine recent research related to data security and to address possible solutions. Research of employing uncommon security schemes into Cloud environments has received an increasing interest in the literature, although these schemes are neither mature nor rigid yet. This work aspires to promote the use of security protocols due to their ability to reduce security risks that affect users of data Cloud services.en-USCloud ServiceService Level AgreementCloud EnvironmentCloud StorageCloud Service ProviderSecurity Issues on Cloud Data ServicesBook chapterhttps://doi.org/10.1007/978-3-662-43616-5_19