Fig. 9From: An efficient attribute-based hierarchical data access control scheme in cloud computingThe storage cost of ciphertextBack to article page