This document analyzes security concerns and methodologies related to cloud computing. It begins with an abstract that introduces cloud computing and discusses security concerns with utilizing cloud-based services. The document then reviews literature on cloud computing fundamentals, performance, scalability, availability, and security challenges. It examines common security threats to cloud computing like data loss, malicious insiders, insecure interfaces, and account hijacking. The document also outlines requirements for security in cloud computing and analyzes cryptographic algorithms and their parameters that can help strengthen security. It concludes by comparing different cryptographic algorithms based on parameters like level of data protection and availability.