This document discusses security threats and remedies in cloud computing. It begins by introducing cloud computing and its deployment models including public, private, and hybrid clouds. It then describes the different cloud service models such as SaaS, PaaS, and IaaS. The document proceeds to outline several security threats in cloud computing including backdoor channel attacks, denial-of-service attacks, insecure APIs, and SQL injection attacks. Finally, it discusses some potential improvements and controls for cloud security like strong encryption, activity monitoring, and user authentication.