Fig. 9From: Multi-security-level cloud storage system based on improved proxy re-encryptionPerformance of delegation by data ownerBack to article page