Abstract-Cloud computing is an arrangement of InformationTechnology administrations offered to clients over the web on a leased base. Such administrations empower the associations to scale-up or downsize their in-house establishments. By and large, cloud administrations are given by an outside supplier who has the game plan. Cloud computing has numerous focal points, for example, adaptability, productivity, versatility, combination, and capital lessening. In addition, it gives a progressed virtual space for associations to convey their applications or run their operations. With dismissal to the conceivable advantages of Cloud computing administrations, the associations are hesitant to put resources into Cloud computing chiefly because of security concerns. Security in Cloud computing is an essential and basic angling that upset the development of Cloud computing, and has various issues and issue identified with it. Cloud administration supplier and the cloud administration purchaser ought to ensure that the cloud is sufficiently sheltered from all the outer dangers so that the client does not confront any issue, for example, loss of information or information burglary. There is likewise a probability where a noxious client can infiltrate the cloud by mimicking a real client, along these lines tainting the whole cloud and influences numerous clients who are sharing the contaminated cloud. This paper firstly records the parameters that influence the security of the cloud then it investigates the cloud security issues and issues confronted by cloud administration supplier and cloud administration customer, for example, information, protection, and contaminated application and security issues. It likewise plates a few tips for handling these issues.