Research Article
[Retracted] Cloud Computing Storage Data Access Control Method Based on Dynamic Re-Encryption
Table 2
Comparison results of user satisfaction.
| User | Method of this article | Big data access control method based on the blockchain | Hadoop big data access control model based on data sensitivity |
| 1 | 9.6 | 7.5 | 7.4 | 2 | 9.5 | 7.8 | 7.6 | 3 | 9.4 | 8.0 | 7.8 | 4 | 9.0 | 8.1 | 8.0 | 5 | 9.9 | 7.5 | 7.1 | 6 | 8.9 | 7.1 | 7.1 | 7 | 9.2 | 7.0 | 7.0 | 8 | 9.3 | 7.6 | 6.9 | 9 | 9.3 | 7.2 | 6.9 | 10 | 9.5 | 7.4 | 7.6 |
|
|