Research Article

[Retracted] Cloud Computing Storage Data Access Control Method Based on Dynamic Re-Encryption

Figure 7

Comparison of energy consumption in different stages. (a) User private key generation stage. (b) Data encryption stage. (c) Data decryption stage. (d) Revocation stage.
(a)
(b)
(c)
(d)