Fig. 6From: Multi-security-level cloud storage system based on improved proxy re-encryptionThe system processing flowBack to article page