Research Article

A New Secure Model for Data Protection over Cloud Computing

Figure 9

Privileges of data owner for users.