Fig. 6From: Privacy preserving model: a new scheme for auditing cloud stakeholdersIdentifying the authentication process of CSP for fulfillment of data-privacy requirementBack to article page