The document presents a novel protocol for secure data outsourcing to cloud services, aimed at protecting sensitive information from unauthorized access while addressing inefficiencies in mobile device communication. It introduces a hybrid approach to key management that optimizes cryptographic operations by delegating computational tasks to cloud providers, thereby reducing the burden on mobile users. Additionally, the protocol incorporates re-encryption to facilitate efficient user revocation, enhancing overall data security and scalability in cloud computing environments.