Paritosh pawar

Fog computing to insider data theft attacks in the cloud by using data mining and otp mechanism - p37-41


Cloud security
Data mining
digitalsignature
log formation
otp