Research Article
A New Private Information Encryption Method in Internet of Things under Cloud Computing Environment
Table 5
Attack number comparison.
| Encryption time (s) | BKG | ACBE | DSSE | Proposed |
| 20 | 29 | 23 | 20 | 12 | 40 | 37 | 33 | 28 | 16 | 60 | 42 | 38 | 31 | 18 | 80 | 48 | 42 | 35 | 20 | 100 | 52 | 47 | 37 | 21 | 120 | 53 | 50 | 39 | 22 | 140 | 58 | 55 | 43 | 23 | 160 | 61 | 57 | 46 | 24 | 180 | 65 | 59 | 48 | 25 | 200 | 67 | 61 | 50 | 26 |
|
|