The Tried and True Way for Virtual Data Security in coordination by Step