Return to Article Details Survey on security threats in mobile cloud computing Download Download PDF