understanding cloud computing vulnerabilities - Search