Comparison of Cloud Computing Security Threats and Their Counter Measures Shourya Rohilla (&) and Rejo Mathew Department of Information Technology, NMIMS (Deemed-to-be) University, Mumbai, India shouryarohilla10@gmail.com, rejo.mathew@nmims.edu Abstract. One of the major driving forces in the current technological world, is the concept of cloud computing. Many companies and organizations have their precious data stored on various cloud computing platforms. Organizations depend on cloud computing will effectively manage the excessive data quantity and handle them. In such a scenario, a breach of that data or any major threat can cause huge damage to the image and nancial position of the company. Due to a security breach, if all of those data is leaked to an unauthorized intruder, it can lead to severe manipulations of that data and cause huge losses to the assets of the company. Hence, various counter measures to tackle those security issues are discussed in this paper. All the possible data issues are listed out and the various methods to counter them are discussed. Keywords: Cloud computing Á Condentiality Á Integrity Á Availability Á Authentication Á Intrusion Detection Systems 1 Introduction Cloud computing comes out as one of the fastest growing technologies in the world of data storage and management [1]. Even after being highly successful and effective in its purpose, cloud computing technology has various security threats and issues. These threats include data loss, data leakage to a third party, network threats [2], etc. Various methods and solutions are discussed to tackle those issues in this paper. Cloud computing challenges are usually related to the protection of the CIA triad [1]. Any harm to any of the component of the CIA triad can lead to hampering of its business. Moreover, maintaining CIA is more dif cult in cloud computing because of its architectural pattern that allows customers to share computing resources in a private or public cloud and also the nature of the infrastructure which is usually distributed [1]. The paper is organized in the following sections. Section 1 gives the brief intro- duction about the paper and the issues and solutions it is going to tackle. Section 2 discusses about the problems or methods that are described in the papers that pose a challenge to cloud computing. Section 3 discusses about the various solutions/counter measures to those problems. Section 4 is the analysis/review table that discusses or compares the features of the six solutions. Section 5 concludes the paper with the conclusion write up and the corresponding future work. © Springer Nature Switzerland AG 2020 A. P. Pandian et al. (Eds.): ICCBI 2019, LNDECT 49, pp. 224231, 2020. https://doi.org/10.1007/978-3-030-43192-1_25