Abstract: Cloud applications have transformed the data into various stored, processed, and accessed forms. However, they remain vulnerable to cyber threats, including unauthorized access and security ...