Author:
Venkatalakshmi G.,Sridhar S.
Reference32 articles.
1. Design and Implementation of Security Reverse Data Proxy Server Based on SSL
2. A Pattern for Enabling Multitenancy in Legacy Application
3. L. Chen, H. Takabi, and N.-A. Le-Khac, Security, Privacy, and Digital Forensics in the Cloud. John Wiley & Sons, 2019.
4. Security Threats and Challenges in Public Cloud Storage
5. V. Singh et al., “10 Benefits of Using Cloud Storage,” Apr. 20, 2020. https://cloudacademy.com/blog/10-benefits-of-using-cloud-storage/ (accessed Jul. 03, 2021).