Fig. 4From: Low-cost data partitioning and encrypted backup scheme for defending against co-resident attacksProbabilities of data corruption and data theft under various values of nBack to article page