Research Article

Cloud Trust-Driven Hierarchical Sharing Method of Internet of Things Information Resources

Figure 4

A comparative analysis of the shared time between the two mechanisms under attack type 1.