Fig. 4From: An efficient and secure data sharing scheme for mobile devices in cloud computingIntegrity Verification PhaseBack to article page