Research Article

An Efficient Framework for Sharing a File in a Secure Manner Using Asymmetric Key Distribution Management in Cloud Environment

Figure 6

Time consumed to generate a key of different sizes by CKMS used by 3 different algorithms.