Fig. 2From: Data security in decentralized cloud systems – system comparison, requirements analysis and organizational levelsOverview of organizational decentralizationBack to article page