This is particularly critical in Anti ransom multi-consumer techniques, including virtualized and public cloud techniques, wherever cross contamination of data is an actual possibility. in fact, some possible end users of community cloud compute have resisted relocating for this certain rationale. It can be achieved either by partitioning, the pla