February 21, 2018March 14, 2018 Kenneth Hui Data Encryption in the Cloud, Part 3: Key Management and Key Generation