This report emphasizes on the security threats of cloud computing and discusses the key prevention methods against cloud platform security threats. It covers an overview of the technology used by cyber criminals to hack the information security of cloud applications, main challenges of the security threats, and proper analysis of the literature review about the security extortions to identify some essential gaps.