cloud computing data threats 1

Need a 4 page plagiarism free word doc which explains the below details

1)How could the data in cloud computing architecture be disrupted, and in what ways the flow could be attacked and various ways hackers do to disrupt the data in the cloud

2)Support the above explanation with a threat based on stride model

Use diagrams whenever necessary

Conclusion

References