I. Introduction
Cloud computing is an emerging technology and it provides the platform for providing and hosting many services for the users through the help of the internet. The cloud technology delivers many attractive services to the resource owners and business people that they can do their business without tension and spending much in managing the infrastructure of their demand. Thus they can avail of any shared resource when it is required for their business (on a demand basis) [1]. Despite cloud computing delivers several services with the help of well-developed network technology and the internet, the sharing of data and resources in the network technology causes various critical security issues such as malicious intruders, data breaches, and data loss [2]. The cloud service providers implement the security system to resolve all the security issues. But still, there is a big challenge in implementing a proper and efficient security model. One of the biggest problems is protecting the data stored in the cloud. Despite the outsourced data are stored (encrypted data) after doing the encryption process, the data leaking and attack by the malicious intruders is really a big challenge for the researchers in developing a security model to overcome all these issues [3]. Cloud computing is a growing, needful and promising technology for sharing computing services over the internet on a demand basis. Resource or data protection and security are the most obstacles in this paradigm. The well-growing and glamorous network technology with the life partner of speedy internet encourages the users for online data sharing. Facebook, Instagram, WhatsApp, and Twitter are the social networks give hug and attractive platform for sharing users' data. The cloud service providers encrypting data or use an access control model to data from leaking and unauthorized intruders [4].