Figure 8From: A quantitative analysis of current security concerns and solutions for cloud computingSecurity solutions. Pie chart for solutions citations.Back to article page