Return to Article Details Technique for Isolation of Malicious Nodes from the Cloud Computing Architecture Download Download PDF