Research Article

A Novel Cloud Computing Algorithm of Security and Privacy

Figure 5

Optimization model of cloud computing (after TTP authorizes).
871430.fig.005