Return to Article Details Data Security in Cloud Computing Using Threshold Cryptography and User Revocation Download Download PDF