Abstact: This presentation focuses on data storage and security strategies in terms of network identity security. In the beginning, some background about the topic is introduced. Then, the writer summarizes the methods used in cipher text attacks and the current solutions. In the final,……