Research Article

Speech Encryption Scheme Based on Ciphertext Policy Hierarchical Attribute in Cloud Storage

Table 4

Data user-defined system performance metrics list.

MetricsDefinitions

SetupEnter a safety parameter randomly, the more the number of cycles, the higher the efficiency and the shorter the running time.
KeygenIn addition to inputting the public key, the master key, and a set of attributes, a random number is selected on a finite field and the attribute private key is generated. The more the number of cycles, the higher the efficiency and the shorter the running time.
Encryption timeIt takes time to encrypt plaintext data into ciphertext data. If the system consumes less time, the efficiency of the system is better.
Decryption timeIt takes time to ciphertext data into plaintext data using generated keys. The honest and trusted third-party service provider generates the key. If the system consumes less time, the efficiency of the system is better.
Number of attributesThe number of attributes that are given to user/person to encrypt/decrypt the data or/and to access data stored at cloud. Attributes are given to data users by authorized person or entity.
Size of dataThe size of the speech data to be encrypted and the owner of the data to be encrypted.