Return to Article Details Cloud computing security mechanisms random number authentication Download Download PDF