Return to Article Details Authentication Scheme in Cloud Computing Environment Download Download PDF