Fig. 8From: Reconnoitering the significance of security using multiple cloud environments for conveyance applications with blowfish algorithmComplexities in time periodsBack to article page