Skip to main content

Advances, Systems and Applications

Table 4 Security features comparison

From: An ECC-based mutual data access control protocol for next-generation public cloud

Schemes \(\rightarrow\)

           

Features \(\downarrow\)

[45]

[55]

[37]

[56]

[54]

[70]

[71]

[72]

[69]

[7]

Our

SG1

\(\surd\)

\(\times\)

\(\surd\)

\(\times\)

\(\surd\)

\(\surd\)

\(\surd\)

\(\surd\)

\(\times\)

\(\times\)

\(\surd\)

SG2

\(\surd\)

\(\surd\)

\(\surd\)

\(\times\)

\(\times\)

\(\times\)

\(\surd\)

\(\times\)

\(\times\)

\(\times\)

\(\surd\)

SG3

\(\times\)

\(\times\)

\(\surd\)

\(\times\)

\(\surd\)

\(\surd\)

\(\surd\)

\(\surd\)

\(\times\)

\(\times\)

\(\surd\)

SG4

\(\surd\)

\(\times\)

\(\surd\)

\(\surd\)

\(\times\)

\(\times\)

\(\times\)

\(\times\)

\(\surd\)

\(\surd\)

\(\surd\)

SG5

\(\surd\)

\(\surd\)

\(\surd\)

\(\surd\)

\(\surd\)

\(\surd\)

\(\surd\)

\(\surd\)

\(\surd\)

\(\surd\)

\(\surd\)

SG6

\(\times\)

\(\times\)

\(\times\)

\(\times\)

\(\times\)

\(\surd\)

\(\times\)

\(\surd\)

\(\times\)

\(\times\)

\(\surd\)

SG7

\(\surd\)

\(\times\)

\(\surd\)

\(\surd\)

\(\surd\)

\(\surd\)

\(\surd\)

\(\surd\)

\(\surd\)

\(\surd\)

\(\surd\)

SG8

\(\times\)

\(\times\)

\(\surd\)

\(\times\)

\(\surd\)

\(\surd\)

\(\surd\)

\(\surd\)

\(\times\)

\(\times\)

\(\surd\)

SG9

\(\surd\)

\(\surd\)

\(\surd\)

\(\surd\)

\(\surd\)

\(\surd\)

\(\surd\)

\(\surd\)

\(\surd\)

\(\surd\)

\(\surd\)

SG10

\(\surd\)

\(\surd\)

\(\surd\)

\(\surd\)

\(\surd\)

\(\surd\)

\(\surd\)

\(\times\)

\(\surd\)

\(\surd\)

\(\surd\)

SG11

\(\surd\)

\(\times\)

\(\surd\)

\(\surd\)

\(\surd\)

\(\surd\)

\(\times\)

\(\surd\)

\(\surd\)

\(\surd\)

\(\surd\)