Identifying the Threats in Cloud Computing