Fig. 1From: Ensuring user authentication and data integrity in multi-cloud environmentResults of the degree of the fulfillment of the system comparison characteristicsBack to article page