Return to Article Details Proxy Cryptography Based on Data Uploading and Data Integrity in Cloud Download Download PDF