Return to Article Details An Efficient Auditing Technique for Secure Cloud Computing Using Asymmetric Cryptographic Algorithm Download Download PDF