Return to Article Details Policies and User Perception based Data Security in the Cloud Download Download PDF