Return to Article Details Reliable Techniques for Providing Secure Access Control for Cloud Storage on Mobile Devices Download Download PDF