Return to Article Details Enforcing security in cloud environment using elliptic curve cryptography and third party auditing Download Download PDF