Return to Article Details An Analysis upon Various Security Methods for Identification of Data in Cloud Computing Environment: A Case Study of Predicate Based Encryption