Fig. 7From: Reconnoitering the significance of security using multiple cloud environments for conveyance applications with blowfish algorithmEncryption time period of dataBack to article page