Fig. 8From: Multi-security-level cloud storage system based on improved proxy re-encryptionPerformance of decryption by data ownerBack to article page