Research Article

An Encrypted File Deduplication Scheme with Permission in Cloud Storage

Figure 3

An example of role hierarchies.