The cloud platform is susceptible to being attacked
because of its high concentration of information resources
of users. On the one hand, the target of the malicious
attacker is stealing valuable information or service. These
attacks perhaps come from malicious outside, legal cloud
computing user, or inside staff of the cloud computing
operators. On the other hand, the target of the malicious
attacker is to close the service of the cloud. For example,
DOS (denial of service) attack will destroy the platform
availability and close the service of the cloud. When users
deliver all their data to the cloud service providers without
selecting the expensive backup and disaster recovery service,
they will be faced with the risks of the loss of data. In recent
years, such events happened in the cloud providers now and
again. So the cloud provider should integrate the current
security technologies to ensure the service, and the users
should not too depend on the cloud provider.