Rachana C R, Associate Professor & Head, DoS in Computer Science, PG Wing of SBRR Mahajana First Grade College (Autonomous) Pooja Bhagavat Memorial Mahajana Education Centre, K.R.S. Road, Metagalli, Mysuru-16.Dr. Reshma Banu, Professor & Head, Department of I S E, GSSSIETW, Mysore, Karnataka, India.Dr. G F Ali Ahammed, Associate Professor, Department of Computer Science Engineering, VTU Post Graduate Centre, Mysuru.Dr. Parameshachari B D, Professor & Head, TCE Dept., GSSSIETW, Mysore, Karnataka, India.2026-03-242017http://118.151.209.220:4000/handle/123456789/335Cloud computing describes highly scalable resources provided as an external service via the Internet on a basis of pay-per-use. From the economic point of view, the main attractiveness of cloud computing is that users only use what they need, and only pay for what they actually use. Resources are available for access from the cloud at any time, and from any location through networks. Cloud computing is gradually replacing the traditional Information Technology Infrastructure. Securing data is one of the leading concerns and biggest issue for cloud computing. Privacy of information is always a crucial pointespecially when an individual’s personalinformation or sensitive information is beingstored in the organization. It is indeed true that today; cloud authorization systems are notrobust enough. This paper presents a unified approach for analyzing the various security issues and techniques to overcome the challenges in the cloud environment.enAttributesCloud computingdeployment modelssecurityservice modelsCloud Computing – A Unified Approach for Surveillance IssuesArticle