“…high, medium, and low) 1 . III) In the Mitigation Phase, a security module performs the encryption of the file depending on the risk scoring detected in the previous phase by using a multi-level security engine, which uses symmetric encryption to ensure privacy and confi-85 dentiality [20], attribute-based encryption to ensure confidentiality and access control [21,22,13], and digital signatures to ensure integrity and authentication [23,13]. Security level can be changed onthe-fly and the security level for the three types of 90 encryption is determined based on the risk level detected on the file content/context (The bigger the risk level, the larger the size of the encryption keys) and the access control attributes are chosen for each file depending on the context (The attributes of the 95 users included in a sharing operations are on-thefly defined and used in the encryption/decryption of each file).…”