Security Mapping In Cloud Computing