Research Article
Toward Serverless and Efficient Encrypted Deduplication in Mobile Cloud Computing Environments
Figure 2
Various types of file encryption processing (H_1: hash, SE: symmetric encryption, and exp: exponentiation). (a) Concurrent processing. (b) Sequential processing.
(a) |
(b) |