##plugins.themes.academic_pro.article.main##
Abstract
Sharing of resources like processing, data, services etc. through a web based delivery system constitutes the
concept of a cloud based computing normally. The supplier presents all its resources via the web which may
be accessed by the buyer on multiple devices and platforms on-demand. These will be simply provisioned as
per demand with very little or no effort. Examples of cloud computing resources are Google Maps by
Google, Amazon Web Services by Amazon and so on. Over the past few years, there has been an exponential
growth within the field of cloud computing because the need for services on-the-go for mobile platforms has
seen a speedy increase in demand. This successively has spurred the requirement for multiplied security
measures for cloud computing. Security is the primary issue for cloud as well as other internet services. The
primary reason preventative of a complete adoption of cloud computing is in truth the various security
problems it comes with, despite however useful it's going to be. A number of these problems like knowledge
breach, hacking, malware, DoS attacks are fairly acquainted and almost like the protection issues of a
familiarweb services and systems. Whereas threats like abusing cloud services, APT parasites etc are
specific to cloud computing. The end-user of cloud services can perpetually be troubled by the protection,
vulnerabilities and convenience of their knowledge on cloud servers. The principal objective of this paper is
to debate such threats and vulnerabilities in cloud computing. This study will modify customers, vendors as
well as fellow researchers to have an insight regarding key issues associated with cloud security