Research Article

Protection of Sensitive Data in Industrial Internet Based on Three-Layer Local/Fog/Cloud Storage

Figure 5

Protection process for real-time data.