Research Article

Toward Serverless and Efficient Encrypted Deduplication in Mobile Cloud Computing Environments

Figure 2

Various types of file encryption processing (H_1: hash, SE: symmetric encryption, and exp: exponentiation). (a) Concurrent processing. (b) Sequential processing.
(a)
(b)