Research Article
[Retracted] Hybrid Encryption Algorithm for Sensitive Information of College Physical Fitness in Cloud Storage Environment
Table 2
Sharing performance parameters of different sensitive information encryption methods.
| | Sharing scheme | Test group a | Test group b | Test group c | Test group d |
| | Attribute hiding | √ | — | — | — | | Property undo | √ | — | — | √ | | User revocation | √ | √ | √ | √ | | Computing outsourcing | √ | — | — | √ | | Fine grained access | √ | √ | √ | √ | | Sharing mode | Many to many | One to many | One to many | One to many |
|
|