Fig. 8From: Ensuring user authentication and data integrity in multi-cloud environmentOrganizational levelsBack to article page