???? ???, ????? ??? ?? ?? ? ???? ??? ??? ?? ??? ???? ???? ??[40] Users can encrypt data that may be processed or stored in the cloud to circumvent unauthorized accessibility.[forty] Identity management techniques can also supply simple solutions to privacy worries in cloud computing. These devices distinguish in between approved and unauthorized us