Fig. 4From: Privacy preserving model: a new scheme for auditing cloud stakeholdersWorking process of malicious insider and TPA for guaranteeing the privacy-preserving authenticationBack to article page