The security laws which are implements to secure data in the cloud are as follows:
- Input validation : controls the input data which is being to any system.
- Processing : control that the data is being processed correctly and completely in an application.
- File : control the data being manipulated in any type of file.
- Output reconciliation : control the data that has to be reconciled from input to output.
- Backup and recovery: control the security breaches logs and the problems which has occurred while creating the back.