Skip to main content

Table 2 Comparing and contrasting of system

From: Ensuring user authentication and data integrity in multi-cloud environment

Author (s)

%Authentication

%Availability

%Complexity

%Risk

Shokerand A

••

•••

••••

••

Bessani

•••

••••

•••

•

Thandeeswaran R

••

••••

••

•••

Thandeeswaran R

•••••

••••

•

•••

Eshwari J

•••••

••••

••

•

Kavitha M

•••••

••••

•••

••••

Our system

•••••

•••••

•

•

  1. •••••: very good ••••: good •••: medium ••: weak •: very weak