The document proposes a crypto mechanism to securely store IoT data in the cloud. It discusses challenges with securing IoT data due to resource constraints of IoT devices and limitations of traditional encryption algorithms. The proposed model includes modules for authentication, data intake/encryption, management, and decryption. It establishes secure connections between IoT devices, cloud and users. Data from IoT devices is encrypted before storing in the cloud database. Encrypted data is decrypted and displayed to users after authentication. The model aims to securely store IoT data in the cloud while addressing issues like inference attacks and efficiently utilizing resources.