Fig. 7
From: An efficient attribute-based hierarchical data access control scheme in cloud computing

Encryption and decryption time when the structure level increases
From: An efficient attribute-based hierarchical data access control scheme in cloud computing
Encryption and decryption time when the structure level increases