International Journal of Advanced Research in Computer Engineering & Technology
Cloud computing has been envisioned as the next generation architecture of the IT enterprise. Today's organizations, but there exist a many security vulnerabilities. Cloud computing dynamically allocate, deploy, redeploy and cancel the services on the basis of demand. However, cloud computing inevitable possess new challenges because traditional security mechanisms being followed are in sufficient to safeguard the cloud assets. Cloud computing is easily can be targeted by the attackers. A group of malicious users or illegitimate users are attack on system and denial the services of legitimate users.