Return to Article Details Data Security Using Tree Traversal