Research Article

A New Secure Model for Data Protection over Cloud Computing

Figure 1

(a) The process of logging user on the cloud. (b) The process of uploading file on the cloud OTP.
(a)
(b)