Fig. 2From: Ensuring user authentication and data integrity in multi-cloud environmentSpammer’s attack patternBack to article page