Research Article

Cloud Based Data Protection in Anonymously Controlled SDN

Figure 3

The time cost for algorithms of verifiable outsourcing protocol in the data plane.