Cloud computing (CC) permits more users for storing as well as distributing their applications and data. CC continuously evolving technology that can improve agility, availability, collaboration, and scalability of data. It offers on-demand solution for different applications namely data storage, servers, databases, networking, and software. One of the most challenging issues in CC is detecting attacks. Parallel sponge-based authenticated encryptionwith sidechannel protection and adversary-invisible nonces (PSASPIN) to sponge construction was designed [1]. Moreover, leveled implementation has also utilized in implementing key generation via pseudo random function (PRF). Next, data preprocessing has utilized to minimize the code size. Finally, security proof has ensured using game theory and therefore processing shorter messages significantly. The authenticated encryption (AE) schemes such as security, performance, and efficiency are enhanced.*Author for correspondence Despite improvement found in terms of communication complexity and throughput were not focused.Side channel assault also utilizes physical data which leaks as of cryptographic tool. For avoiding from these attacks, divide-and-conquer approach is employed. Here, malicious user splits key into subkeys, endeavors for recuperating sub-keys distinctly as well as integrates them to create key. Reinforcement-strategy-based side-channel attack has designed in [2] with divide-and-conquer. Initially, the power leakage models are modified, and accuracy has improved. Next, the recovered sub-keys are integrated during the attack phase through validation therefore mitigating side-channel attacks significantly and improving the successful recovery rate. Though successful recovery rate has ensured but the detection time and accuracy have not focused. The disclosure of the cloud storage in the recent years carries enormous east to person life. Moreover, business establishments as well as organizations transmitted huge data for storage also. However, the data privacy