Research Article

Security Protection Mechanism in Cloud Computing Authorization Model Using Machine Learning Techniques

Figure 11

Comparison chart between the proposed and existing algorithm.