Figure 5From: A quantitative analysis of current security concerns and solutions for cloud computingSecurity problems. Pie chart for security concerns.Back to article page