Fig. 7From: Multi-security-level cloud storage system based on improved proxy re-encryptionPerformance of encryption by data ownerBack to article page