Research Article

A New Secure Model for Data Protection over Cloud Computing

Figure 4

(a) Registration process. (b) Login process.
(a)
(b)