Otwarty dostęp

A Searchable Re-encryption Storage Method in Cloud Environment


Zacytuj

TABLE I.

SYMBOL DEFINITION
SYMBOL DEFINITION

TABLE II.

THE PERFORMANCE OF THE MOBILE END UPLOAD THE DATA
THE PERFORMANCE OF THE MOBILE END UPLOAD THE DATA

TABLE III.

THE PERFORMANCE OF THE MOBILE END DOWNLOAD THE DATA
THE PERFORMANCE OF THE MOBILE END DOWNLOAD THE DATA

TABLE IV.

TIME COMPARISON ON ENCRYPTION AND DECRYPTION BY USING SRECSM
TIME COMPARISON ON ENCRYPTION AND DECRYPTION BY USING SRECSM

Figure 1.

Comparison of Re-encryption time
Comparison of Re-encryption time

TABLE V.

TIME COMPARISON FOR DIFFERENT ALGORITHM ENCRYPTION
TIME COMPARISON FOR DIFFERENT ALGORITHM ENCRYPTION

Figure 2.

Comparison while increasing the number of keywords
Comparison while increasing the number of keywords

Figure 3.

Comparison while re-encryption and decryption
Comparison while re-encryption and decryption

Figure 4.

The reliability contrast diagram
The reliability contrast diagram
eISSN:
2470-8038
Język:
Angielski
Częstotliwość wydawania:
4 razy w roku
Dziedziny czasopisma:
Computer Sciences, other