Cloud computing is a state of the art in computational paradigm, adapting the way for offering software, hardware design, and procurements. Counter-measures vulnerabilities and threats in the cloud are well documented, yet incapable of addressing security problems which may exacerbate the service quality and customer’s data privacy. In this study, the basic topographies of the cloud computing, security problems, threats, and their solutions are discussed. Moreover, this paper has compared various interference detection and prevention computations that are based upon recent researches on end-to-end encrypting for accessing data that are utilized to address the security issues. Furthermore, this paper highlights symmetric key encryption that is considered as extremely secure, along with asymmetric key encryption, relatively a new method. © 2020, Springer Nature Singapore Pte Ltd.