Figure 2From: A secure online image trading system for untrusted cloud environmentsSource of threats/attacks in a cloud storage service, adapted from Iacono and Torkian (2013).Back to article page