ABSTRACT
Cloud computing employs the use of parallel and highly computed processors to virtually and remotely deliver services. This is an important factor forenterprises whose processing resources are limited and who suffer limitations on the manpower and data storage. This notwithstanding, cloud computing faces a serious threat in the area of data security. This is because the attackers have become very opportunistic and look for any slight loophole that will enable them to bypass the server securities within the cloud computing environment. It is thus important to come up with a systematic approach that can help in identifying the vulnerabilities ...