JCC_V1_N2_A1 Cloud Computing: Security and Applications Awantika Neha Rawat Poonam Rawat Shikha Singh Journal on Cloud Computing 2350-1308 1 2 1 6 Applications, Attack, Cloud Computing, Denial-of-Service, Man in Middle Attack, Risk, Security Cloud computing is becoming a fundamental part of Information Technology. Resource sharing is a pure plug and play model that effectively simplifies infrastructure planning. This is the aim of cloud computing. The two key advantages of this model are ease- of-use and cost-effectiveness. This paper explores some of the basics of cloud computing along with its security and application concerns. The paper also aims to provide the means for understanding the model and exploring options available for complementing your technology and infrastructure needs. February - April 2014 Copyright © 2014 i-manager publications. All rights reserved. i-manager Publications http://www.imanagerpublications.com/Article.aspx?ArticleId=3045