Research Article

A Distributed Access Control with Outsourced Computation in Fog Computing

Table 2

The encryption comparisons of computation cost.

SchemeThe cost of encryption

Literature [7]
Literature [9]
Literature [29]
Our scheme