Fig. 13From: Comprehensive evaluation of key management hierarchies for outsourced dataPermission operation costBack to article page