Figure 2
From: A secure online image trading system for untrusted cloud environments

Source of threats/attacks in a cloud storage service, adapted from Iacono and Torkian (2013).
From: A secure online image trading system for untrusted cloud environments
Source of threats/attacks in a cloud storage service, adapted from Iacono and Torkian (2013).