Research Article
Protection of Sensitive Data in Industrial Internet Based on Three-Layer Local/Fog/Cloud Storage
Table 1
Degree of difficulty for cracking encoding matrix.
| Word size of Galois field | Number of source data blocks k | Number of redundant data blocks m | Cracking time |
| 8 | 6 | 1 | 248 | 8 | 6 | 2 | 296 | 16 | 6 | 1 | 296 | 16 | 6 | 2 | 2192 |
|
|