
Cloud security or cloud computing security defines a set of rules for the protection of data, applications, services and the infrastructure in cloud computing. It mainly focuses on to provide a secure environment for clients. Clients can access services or store their data by using different service models (SaaS, Iaas or Paas) and deployment models (Public, private or hybrid) of cloud computing.
But there are security concerns on both sides service provider and the service user. The cloud service provider must ensure their clients for the protection of data by providing secure servers. It is possible to hijack the data in public loud because the service is shared. Also, there are chances that the employees stole the client’s data. Therefore it is necessary to choose a trusted service provider company. Also, the company must look for suspicious activity in the system. Users also use credentials and not share their passwords with others. Before uploading sensitive information organizations must be aware of risks. Organizations must choose the perfect service model(SaaS, Iaas or Paas) and deployment model(Public, private or hybrid). For example, they must select a private cloud for sensitive data.
Why Cloud security is important

For providing the best services to clients it is necessary to have a secure cloud computing environment. Cloud security is important both for service providers and service users. it is important to keep users data secure from unauthorized access and vulnerabilities. Organizations own the cloud services when they have lack of physical places or lack of data storage capacity. The cloud service provider must provide them all the facilities because they charge for the service. To ensure the data is protected following mechanism is important.
- Access Control
- Auditing
- Authentication
- Authorization
- Encryption
What are the security risks of cloud computing
Security issues in cloud computing security that may be faced by a service provider are below.

Hijacking of data
Hijack is a network security attack in which hackers take control of data during uploading on servers. The data can be hijacked or stolen by hackers. Hackers use hacking techniques to enters communication as an authentic user to steal the data.
Inside threat
Insider threat to an organization can happen due to employees, former employees or the people associated with the business. There are chances of inside attacks on data by employees. They can get sensitive information of clients from servers because they have access.
Data loss
Data can be lost due to system failure or disaster or malicious attack. Many major companies lost their data in the way like Amazon and Google. It is necessary to have a proper backup system and a secure system to avoid data loss.
DDos (Denial-of-service attack) attack
DDoS attack is a Denial-of-service attack. Cloud computing is accessible through the internet so some hackers may disturb the system by a DDoS. DDoS attacks can make your website or servers unavailable for clients.
Human error
Human error is a big threat to data. in cloud security, Human error may happen from both sides (service provider and user). Data can be lost or hacked due to human failures.
Some other risks in cloud security as follows.
- Insecure API
- Malware attacks
- Exploits
- Data breaches