This paper focusses on the current security challengers in cloud computing analyzing and providing solutions to the given challenges.