Analysis the Cloud Computing Algorithm with the Cryptography Based Identity Management | Original Article