The recent developments in Cloud computing technology have tremendously changed the way of computing on an infrastructural and conceptual basis. As the numerous advantages in cloud computing, the computing infrastructure around the world is moving towards cloud-based architecture. However, providing end-to-end security over the massive amount of cloud data is a key concern. With the rapid adoption of cloud computing technology, the security aspects include the protection of information availability, confidentiality, and integrity, are still a hot research area in the cloud computing environment. In the cloud server, there is the possibility of exposing the stored information to malicious parties and compromising the cloud storage. Hence, it is essential to develop a robust and consistent security mechanism for the cloud-based computing environment.