I. Introduction
Cloud computing has been utilized by countless application services as it provides a scalable, resilient, cost-saving, and efficient platform for system development, system hosting, data sharing, and service delivery. Although the cloud provides numerous benefits, security, and privacy are the issues that most organizations are reluctant to use the cloud. Specifically, the privacy and security of their data will be outsourced to the cloud. Basically, cloud service providers (CSPs) provide basic security perimeters such as authentication methods and access logs for their enterprise customers. However, the security and privacy of data outsourced have not been fully assured. Therefore, data owners need to implement additional data privacy-preserving solutions, such as encryption, to protect the content of their data. Nonetheless, implementing both an access control environment and encryption requires double operations and key management costs.