This scheme is intended to be used in a scenario where multiple users are using a storage system to store data. Links: D4.3 - A Proposal for Data Confidentiality and DeduplicationSecurity Primitive: Key ManagementCloud: Storage EfficiencySecurity Requirements Addressed: Data PrivacyContact: IBMSource Code: Closed Source