A Comparative Study of underlying Threats of Cloud Deployment Service Models

We live in a time where information is the key to success or failure. Storing information securely is as important as protecting our identity and future. The cloud environment is created to provide the best information security and accessibility. It was created as a countermeasure of the problems in the widely used Network environment, but it also comes with its own complications. It is important to understand the threats that come with the cloud environment before fully handing over all your information with the expectancy of hundred percent security and backup. An extensive research of experiments and work regarding cloud deployment models is used to find out about the threats. Multiple threats were found but the prominent threats are the ones we decided to highlight in this paper.