Fig. 12From: Ensuring user authentication and data integrity in multi-cloud environmentEvaluation of proposed systemBack to article page