Fig. 5From: Reconnoitering the significance of security using multiple cloud environments for conveyance applications with blowfish algorithmComparison of power with data centersBack to article page