Return to Article Details Data Security using Proxy Based Methods in Cloud Computing Download Download PDF