The explosive growth of Cloud computing technology has led to the enterprise cloud vendors become a lucrative industry. The huge volume of data stored in the cloud not only improves the profit of the cloud vendors but creates the opportunity for illegal access by cyber-criminals. The cloud computing environment often meets the threats such as data breaches, account hijacking, data loss, insecure Application Programming Interface (API), and service traffic hijacking. In the cloud, weak access controls, availability disruptions, unauthorized data exposure, and data leaks are high-level security concerns. Hence, modeling Cloud security is a pivotal concern to secure the sensitive information and infrastructure of cloud computing. Cloud security involves a set of policies, regulations, and technologies to protect data and applications belongs to the cloud. To secure cloud data, Cloud security measures widely involve encryption management and authentication or access control.