In this paper, simulation of some of the potential attacks to users' metadata and data stored
in Eucalyptus database files is used in order to supply the necessary information on
the consequences of abuse of cloud users' information privacy and how to improve
the situations