Fig. 3From: Data security in decentralized cloud systems – system comparison, requirements analysis and organizational levelsFirst concept ideaBack to article page