<p>Graphical representation of papers taken from different journals for this study.</p> Full article ">Figure 2
<p>PRISMA framework for the current research.</p> Full article ">Figure 3
<p>Categorization of cloud security issues based on five security requirements.</p> Full article ">Figure 4
<p>Workflow of data access in model “AuthPrivacyChain” [<a href="#B33-jcp-04-00047" class="html-bibr">33</a>].</p> Full article ">Figure 5
<p>Data storage and access procedure of model “BACC” [<a href="#B61-jcp-04-00047" class="html-bibr">61</a>].</p> Full article ">Figure 6
<p>Data storage and access mechanism of “BMAC” model [<a href="#B62-jcp-04-00047" class="html-bibr">62</a>].</p> Full article ">Figure 7
<p>The procedure of data uploading and sharing of the model “CBFF” [<a href="#B63-jcp-04-00047" class="html-bibr">63</a>].</p> Full article ">Figure 8
<p>Data storage and access mechanism of model “BC-ABAC” [<a href="#B65-jcp-04-00047" class="html-bibr">65</a>].</p> Full article ">Figure 9
<p>Data access and user authentication procedure of blockchain-based IDM model for cloud data [<a href="#B74-jcp-04-00047" class="html-bibr">74</a>].</p> Full article ">Figure 10
<p>User authentication procedure of “EIDM” [<a href="#B75-jcp-04-00047" class="html-bibr">75</a>].</p> Full article ">Figure 11
<p>SSO token generation [<a href="#B77-jcp-04-00047" class="html-bibr">77</a>].</p> Full article ">Figure 12
<p>IAS token generation and authentication verification [<a href="#B78-jcp-04-00047" class="html-bibr">78</a>].</p> Full article ">Figure 13
<p>The decentralized solution of upload and integrity verification of data files proposed in [<a href="#B35-jcp-04-00047" class="html-bibr">35</a>].</p> Full article ">Figure 14
<p>The decentralized storage and integrity verification of a data file suggested in [<a href="#B81-jcp-04-00047" class="html-bibr">81</a>].</p> Full article ">Figure 15
<p>Integrity and deduplication verification process suggested in [<a href="#B83-jcp-04-00047" class="html-bibr">83</a>].</p> Full article ">