This document discusses securing and efficiently scheduling intermediate data sets in cloud computing. It proposes using an upper bound constraint approach to identify sensitive intermediate data sets for encryption. Suppression techniques like semi-suppression and full-suppression are applied to sensitive data sets to reduce time and costs while the Value Generalization Hierarchy protocol is used to provide security during data access. Optimized balanced scheduling is also used to balance system loads and minimize costs. The goal is to efficiently manage intermediate data sets while preserving privacy.