Research Article

A Cloud-User Protocol Based on Ciphertext Watermarking Technology

Figure 1

Data flow of updating process.