This document presents a novel approach to cost-effective privacy preservation of intermediate data sets in cloud computing, arguing against the encryption of all data sets due to inefficiency. The proposed method identifies which intermediate data sets require encryption based on a privacy leakage constraint, reducing costs while still satisfying privacy demands. Experimental results demonstrate significant cost savings over existing methods that encrypt all datasets.