Journal of Applied Sciences1812-56541812-5662Asian Network for Scientific Information10.3923/jas.2015.953.967AminiA. JamilN. AhmadA. R.Z`abaM. R.72015157The cloud computing delivers services of processing data by using parallel and high computational processors virtually and remotely. This is very useful and beneficial to enterprises that have limitations in terms of processing resources, data storages and man power. However, one of the main challenge in cloud computing is data security. Supposed each user has an access to the domain based on the privilege given by the server. However, an attacker always has the opportunity to bypass the privilege by exploring and exploiting every vulnerability and threat found in the cloud computing environment. A systematic approach to identify vulnerabilities and threats is thus very important to ensure only authorized party is allowed to access the data. In this study, several approaches of vulnerability and threat modeling are reviewed and found that none of them is suitable for the cloud computing environment. Therefore, authors presented a dynamic model of identifying vulnerabilities and threats in the cloud computing environment. The proposed model enables the organization to systematically identify vulnerability and threats and analyze the security risk when they use cloud computing services.]]>Khan, A.R.,20127613615Narayan, A., S. Rao, G. Ranjan and K. Dheenadayalan,20122012pp: 17Jehangir, A. and S.M.H de Groot,20122012pp: 16Grobauer, B., T. Walloschek and E. Stocker,201195057Laorden, C., B. Sanz, G. Alvarez and P.G. Bringas,20102010pp: 135142Berghe, C.V., J. Riordan and F. Piessens,20062006CSA.,20102010CSA.,20122012Chao, D., Y. Danfeng, Y. Yun and Y. Fangchun,20092009pp: 831836Kallath, D.,2005200547Dong, G., Z. Liu and D. Zhao,20092009pp: 15Rai, P.K. and R.K. Bunkar,20143490496Bertino, E., L. Martino, F. Paci and A. Squicciarini,2010Pages: 226Pages: 226Zhao, F., H. Huang, H. Jin and Q. Zhang,20116243084321Sladic, G., M. Vidakovic and Z. Konjovic,20112011pp: 5358Lohr, H., T. Poppelmann, J. Rave, M. Steegmanns and M. Winandy,20102010pp: 9196Takabi, H., M. Amini and R. Jalili,20072007pp: 807814Kenyon, H.,20102010Amadi-Echendu, J.E.,20042004pp: 11561160Jiang, J., D. Liping, E. Zhai and Y. Ting,20122012pp: 6170Hashizume, K., D.G. Rosado, E. Fernandez-Medina and E.B. Fernandez,20132013Soares, L.F.B., D.A.B. Fernandes, M.M. Freire and P.R.M. Inacio,20132013pp: 12Ruf, L., A. Thorn, T. Christen, B. Gruber and R. Portmann,20032003Lowis, L. and R. Accorsi,20092009pp: 439444Rouse, M.,20092009 Ryan, M.D.,20138622632268Kandias, M., N. Virvilis and D. Gritzalis,20122012pp: 99103Alhabeeb, M., A. Almuhaideb, P.D. Le and B. Srinivasan,20102010pp: 208213Jouini, M., L.B.A. Rabai and A.B. Aissa,201432489496Malik, N.A., M.Y. Javed and U. Mahmud,20082008pp: 15Prasad, N.R.,20072007pp: 16Santos, N., K.P. Gummadi and R. Rodrigues,20092009Parrend, P. and S. Frenot,20082008pp: 8096Seacord, R.C. and A.D. Householder,20052005McRee, R.,20082008Geric, S. and Z. Hutinski,2007315161Wang, S., Y. Gong, G. Chen, Q. Sun and F. Yang,201359731739Jin, S., Y. Wang, X. Cui and X. Yun,20092009pp: 11711175Msanjila, S.S. and H. Afsarmanesh,200764055Msanjila, S.S. and H. Afsarmanesh,20072007pp: 3-14pp: 3-14The Open Group,2009Pages: 39Pages: 39Lohman, T.,20112011Hamza, Y.A. and M.D. Omar,201332227Demchenko, Y., C. Ngo, M.X. Makkes, R. Strijkers and C. de Laat,20122012pp: 174180Tianyi, Z., L. Weidong and S. Jiaxing,20112011pp: 97102He, Z. and G. Liang,20122012pp: 4044Hanford, S.,20072007