Research Article

Data Protection of Accounting Information Based on Big Data and Cloud Computing

Figure 9

The security index before and after the attack of the two schemes. (a) The security index of the two schemes before the attack. (b) The security index of the two schemes after the attack.
(a)
(b)