Global Journal on Technology Issue 8 (2015) 15-28 Selected Paper of 2nd Global Conference on Computer Science, Software, Networks And Engineering, (COMENG-2014) 06 - 08 November 2014, Efes “üƌŵeli Hotel & CoŶǀeŶtioŶ CeŶteƌ – İzŵiƌ, Kuşadası, Turkey Cloud Computing Security: A Survey Muhammad Roman*, Institute of Information Technology, Kohat University of Science and Technology, Kohat. Shafiullah Khan, Institute of Information Technology, Kohat University of Science and Technology, Kohat. Suggested Citation: Roman, M. & Khan, S. (2015). Cloud Computing Security: A Survey, Global Journal on Technology [Online]. 08, pp 15-28. Available from: http://awer-center.org/gjt/ Received June 20, 2014; revised July 10, 2014; accepted October 11, 2014. Selection and peer review under responsibility of AssoĐ. Pƌof. Dƌ. Özcan Asilkan. ©ϮϬϭϱ SPROC - Academic World Education & Research Center. All rights reserved. Abstract Cloud computing brings new possibilities for individuals and firms to utilize computing as a utility. It utilizes ĐoŵputiŶg poǁeƌ iƌƌeleǀaŶt of useƌ’s loĐatioŶ aŶd deǀiĐes. Thus it has ďeĐoŵe ŵoƌe deŵaŶdiŶg due to its performance, high computing power, cheapness, elasticity, accessibility, scalability and availability. Cloud computing offers ubiquitous operation with different security challenges. In this paper we discuss security challenges and vulnerabilities as well as limitations of current security modules. This paper will serve as a baseline guide for new researchers in this area. Keywords: cloud computing security, infrastructure-as-a-service(IAAS), Platform-as-a-Service(PAAS), Software- as-a-Service(SAAS), private cloud, public cloud, hybrid cloud, trust, vulnerabilities . * ADDRESS FOR CORRESPONDENCE: Muhammad Roman, Institute of Information Technology, Kohat University of Science and Technology, Kohat. E-mail address: roman.kht@gmail.com