Research Article

Group Delegated ID-Based Proxy Reencryption for the Enterprise IoT-Cloud Storage Environment

Figure 5

System flow of data storing and sharing phase.