Problem
Co-tenancy is considered to be a key reason why cloud security is different from traditional computer security. Explain in your own words why it is so. Consider the following scenario: Your Company uses the Nozama cloud service to store sensitive documents. Your task is to analyze the threat model and as a part of that, you are considering the attacker model. Would you consider the cloud service provider (Nozama ) a malicious attacker? Provide at least two arguments each for and against considering Nozama as a potential attacker.