Figure 6
From: Identity-based controlled delegated outsourcing data integrity auditing scheme

The computation overhead at the TPA and CSP sides under different detection probabilities of corruption.
From: Identity-based controlled delegated outsourcing data integrity auditing scheme

The computation overhead at the TPA and CSP sides under different detection probabilities of corruption.