This document proposes a scheme for providing high security for encrypted data stored in the cloud. It outlines a secure, easily integrated, and fine-grained mechanism for verifying query results over encrypted cloud data. The scheme allows an authorized user to verify the correctness of each file in a query result set, as well as detect if any qualified files were not returned. It constructs verification objects for outsourced encrypted files that can be used to verify results. Trapdoor, decryption, and verification keys are generated to control access and detect unauthorized access attempts. The scheme guarantees the authenticity of verification objects and ensures the cloud server learns nothing about requested objects.