Return to Article Details Cloud Computing: A Study of Vulnerabilities