Two-factor data security protection mechanism for cloud storage system
In ordinary data sharing, a data sender, say Alice, first encrypts the sharing data under the identity of a data receiver, say Bob, and next uploads the ciphertext to the cloud server.