The system is composed of client, access control layer, cloud management, computing layer and security storage layer.