Fig. 11From: Privacy preserving model: a new scheme for auditing cloud stakeholdersNumber of malicious attempts of TPA versus successful rate of detecting the malicious behaviorBack to article page