Research Article
[Retracted] E-Commerce Data Access Control and Encrypted Storage Based on Internet of Things
Table 1
The amount of computation in the IoT data network stage (unit/MB).
| Processing times | The proposed method | CP-ABE algorithm | CP-ABE and XACML methods | Access control | Encrypted storage | Access control | Encrypted storage | Access control | Encrypted storage |
| 1 | 10.23 | 10.44 | 50.79 | 50.89 | 110.23 | 110.89 | 2 | 10.24 | 10.45 | 50.77 | 50.89 | 110.24 | 110.89 | 3 | 10.23 | 10.43 | 50.79 | 50.88 | 110.25 | 110.34 | 4 | 10.23 | 10.43 | 50.78 | 50.89 | 110.43 | 110.99 | 5 | 10.23 | 10.43 | 50.76 | 50.88 | 110.25 | 110.56 |
|
|