Research Article
Secure Outsourced Medical Data against Unexpected Leakage with Flexible Access Control in a Cloud Storage System
Figure 2
Experimental results for our proposed system. (a) System setup time (ms). (b) SC generation time (ms). (c) SC delegation time (ms). (d) Encapsulation time (ms). (e) Decapsulation time (ms). (f) Improved SC generation time (ms). (g) Improved encapsulation time (ms).
(a) |
(b) |
(c) |
(d) |
(e) |
(f) |
(g) |