International Journal of Computer Applications
Now-a-days, cloud computing has achieved formidable impetus where IT infrastructures and applications are provided as service to end users. It provides shared pool of resources in addition with data storage, computer processing power and specialized corporate and user applications. Users can access cloud services any time anywhere and store large amount of data from anywhere, due to increases the popularity of cloud computing there is risk of security. Data which is stored on cloud may be vulnerable which is easy for attackers to compromise the virtual machines as zombies and explore these vulnerabilities in cloud system.