Research Article

A New Secure Model for Data Protection over Cloud Computing

Figure 2

Phases for our model. (a) Phase 1. (b) Phase 2. (c) Phase 3. (d) Phase 4.
(a)
(b)
(c)
(d)