Fig. 8From: An efficient attribute-based hierarchical data access control scheme in cloud computingThe storage cost of private keyBack to article page