Data confidentiality and integrity verification using user authenticator scheme in cloud | IEEE Conference Publication | IEEE Xplore