International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 7 279 – 282 _______________________________________________________________________________________________ 279 IJRITCC | July 2017, Available @ http://www.ijritcc.org _______________________________________________________________________________________ Threats –Solutions in Cloud security Ranjit Kumar 1 , 1 Department of Computer Science & Engineering, Rayalaseema university,kurnool, Andhra Pradesh, India ranjithphdd@gmail.com L.Venkateswar Reddy 2 2 Department of Information and Technology Sree vidyaniketan Engineering college,chittor, Andhra Pradesh, India lakkireddy.v@gmail.com Abstract: Distributed computing frameworks speak to a standout amongst the most complex processing frameworks as of now in presence. Current uses of Cloud include broad utilization of disseminated frameworks with shifting level of network and use. With a late concentrate on huge scale expansion of Cloud processing, personality administration in Cloud based frameworks is a basic issue for the maintainability of any Cloud-based administration. This zone has additionally gotten extensive consideration from the exploration group and also the IT business. Diverse calculations and methodology are utilized by the specialists. Still distributed computing security is in its center stage. A few IT organizations are concentrating on cloud security and cloud information security. This paper gives a thought regarding security dangers and arrangements. Keywords: Cloud computing, security, attacks, distributed computing __________________________________________________*****_________________________________________________ I. Introduction Distributed computing develops this pattern through mechanization. As opposed to arranging with an IT association for assets on which to convey an application, a register cloud could be a self-administration recommendation wherever a MasterCard can purchase process cycles, and an online interface or API is utilized to make virtual machines and set up system connections between them. Instead of requiring a long haul contract for administrations with an IT association or an administration supplier, mists chip away at pay-by-use show wherever an application may exist to run business for various minutes orhours, or it will exist to supply administrations to clients on a long haul premise. It almost abandons expression that distributed computing amplifies the present pattern of making administrations accessible over the system. For all intents and purposes every undertaking has perceived the value of Web-based interfaces to their applications, regardless of whether they are inward applications that are made out there to the staff, accomplices, suppliers, experts. The estimation of basically based administration conveyance is that applications will be made out there wherever, and whenever. Though ventures are mindful of the adaptability to secure interchanges the quality Secure Socket Layer (SSL) encoding adjacent to durable confirmation, bootstrapping trust in an extremely distributed computing environment needs painstakingly considering the varieties between big business figuring and distributed computing. Once legitimately architected, web administration conveyance will offer the flexibleness and security required by endeavors of all sizes. Distributed computing and matrix figuring are versatile. Quantifiability is refined by utilizing load adjusting of utilization cases running on an individual premise on a spread of agent frameworks and associated through net administrations. Electronic hardware and system data measure is dispensed and dis-assigned on interest. The framework stockpiling ability will goes here and there relying on the measure of clients, examples, furthermore the amount of data exchanged at a given time. Both figuring assortments include multi-tenure, which implies that a great deal of clients will perform entirely unexpected assignments, getting to one or numerous application occurrences. Sharing assets among a larger than usual pool of clients helps with lessening foundation costs and top burden capacity. Cloud and lattice processing give administration level understandings (SLAs) for secure timeframe administration; the purchaser can get administration kudos for accepting data late. The Amazon S3 gives an online administrations interface to the capacity and recovery of data inside the cloud. Setting a most confines the amount of articles we will store in S3. We can store an item as one byte and as vast as 5 GB or perhaps numerous terabytes. II. Threats and solutions Security danger is one of the wellsprings of the specialized danger that clients perceive and in this way can be said as the danger of being not able fulfill the security prerequisites among clients amidst or in the wake of utilizing cloud administration [1]. Besides, since cloud server farms are putting away data on numerous organizations and people, it is likely that they are harmed by programmers and that insider's information spillage dependably exists. Indeed, cloud administration has numerous security dangers in cloud execution situations or in the earth helpless against strict detachment in nature. The security dangers of cloud