Detecting Suspicious File Migration or Replication in the Cloud | IEEE Journals & Magazine | IEEE Xplore