Fig. 11From: Ensuring user authentication and data integrity in multi-cloud environmentPerformance of systemBack to article page