Fig. 7
From: Enhancement of cryptography algorithms for security of cloud-based IoT with machine learning models

Comparison of encryption algorithms’ performance on IoT and cloud data, displaying memory usage, memory per traffic, and ORCS for the encrypted algorithms.