Ms. Sugandha Nandedkar, Ms.Sangeeta Kakarwal
Cloud computing is a type of computing that relies on sharing computing resources rather than having local servers or personal devices to handle applications. Cloud computing provides significant cost effective IT resources as cost on demand IT based on the actual usage of the customer. Despite of this cloud computing also causes significant changes in the vulnerability factor. Thus moving to a cloud infrastructure, it might change the attackers’ access level and motivation, as well as the effort and risk—a fact that must be considered as future work. But, for supporting a cloud-specific risk assessment, it seems most profitable to start by examining the exact nature of cloud-specific vulnerabilities. This paper focuses more on cloud-specific vulnerabilities. As well as puts some of the corrective measures we can follow to safely handle it.