Research Article

A Privacy Protection Scheme for IoT Big Data Based on Time and Frequency Limitation

Table 2

Cost comparison.

SchemesSecret key costDecryption costRevocation
UserCSPAttribute-costUser-cost

[55]3p×
[56]××
Our scheme