Modeling Against the Top Threats in Cloud