Fig. 5From: Ensuring user authentication and data integrity in multi-cloud environmentAn Integrity Schema in the Multi-CloudBack to article page