This report discusses the security threats and preventive methods in cloud computing. It covers the relevant technologies and applications, challenges with security, and identification of gaps in the discussion. The report highlights the critical issues of lack of legal protection regarding privacy and shared dangers and technologies.