Return to Article Details Review of Potential Threats on Cloud Computing Download Download PDF