“…Some threats and attacks have been undertaken properly, while others are still remaining to be solved. These aspects are also related security and privacy in systems other than cloud computing [99], [100], [101], [102], [103], [104], [105], [106], [107], [108], [109], [110], [111], [112], [113], [114], [115], [116], [117], [118], [119], [120], [121], [122], [123].…”