Any security mechanism below the security boundary must be created into the program and should be preserved by The shopper. This eliminates the necessity to install and run the application to the cloud person's personal computers, which simplifies servicing and support. Cloud programs vary from other programs in their http://cloud-computing-security41722.livebloggs.com/199220/cloud-computing-security-an-overview