Fig. 9From: Reconnoitering the significance of security using multiple cloud environments for conveyance applications with blowfish algorithmComparison of space complexitiesBack to article page