Analysis of security threats and prevention in cloud storage: review report Kuppuswamy Prakash*, Al-Khalidi Saeed Q Y** *Lecturer, Computer Engineering & Networks Department, Jazan University, KSA **Dean, Deanship of Libraries Affairs, King Khalid University, KSA Online published on 7 June, 2014. Abstract The term "cloud" is used as a representation of the Internet and other communications systems as well as an abstraction of the underlying infrastructures involved. It is a model for enabling global, convenient, on-demand network access to a shared pool of configurable computing resources. Cloud computing is a disruptive technology that has the potential to enhance collaboration, agility, scaling and availability and provides the opportunities for cost reduction through optimized and efficient computing. Data resting in the cloud needs to be accessible only by those authorized to do so, making it critical to both restrict and monitor who will be accessing the company's data through the cloud. In order to ensure the integrity of user authentication, companies need to be able to view data access logs and audit trails to verify that only authorized users are accessing the data. This paper discussed about security threats and prevention methodology of cloud computing storage. Top Keywords Cloud storage, Cloud security, Cloud threats, Malicious attacker etc. Top |