Fig. 6From: Ensuring user authentication and data integrity in multi-cloud environmentAn overview of the proposed systemBack to article page