Return to Article Details Cloud security: to prevent unauthorized access using an efficient key management authentication algorithm Download Download PDF