“…This is one of the major cloud issue which should be considered at every phase of designing a cloud architecture (Wang et al 2009;Kamara and Lauter 2010;Mansfield-Devine 2012;Asghar et al 2013;Wang et al 2014a;TCG 2015;Herranz et al 2014;Wang et al 2014b;Coron et al 2014;Smart and Vercauteren 2014;Wang et al 2015a;Halevi and Shoup 2015a;Fujinoki 2015;Hadavi et al 2015;Demmler et al 2015;Roy et al 2015;AlBelooshi et al 2015;Han et al 2015;Xiang et al 2016). There are many types of sensitive information: personal, corporate/governmental financial information, health, biometric information, religious or racial information, sexual orientation, job performance information, collections of surveillance, taking photos/videos in public places, usage data collected from various devices (computers, printers, smart phones), behavioral information (e.g., viewing digital content), visited websites, product usage history, IP addresses, RFID tags, and unique hardware identities.…”