Return to Article Details An efficient fog computing for comprising approach to avoid data theft attack Download Download PDF