Research Article

A New Secure Model for Data Protection over Cloud Computing

Figure 7

(a) User role, (b) data owner role, and (c) administrator role.
(a)
(b)
(c)