“…Traditionally, we assume that data owners, users, and storage server are in the same domain and also that the server is fully trusted [1,2,3,4,5,6,7,8,9]. However, in BYOD, cloud computing and outsourcing environments, data confidentiality is not guaranteed since the data is stored and processed within the third party environment.…”