Return to Article Details Data privacy in cloud computing: A comparative study of privacy preserving techniques Download Download PDF